Description
WHOM IS IT APPLICABLE
- EHE (Ethical Hacking Expert)
- System Administrator
- Network Server Administrator
- Firewall Administrator
- Security Tester
- Rsk Assessment Professional
- Web security administrator
- IT professional and anyone who is interested in penetration testing
WHAT YOU WILL LEARN
In this course, you will learn about:
- Penetration testing
- Information gathering from different sources
- Analysis and documentation based on information gathered
- Hacking systems/web apps to prepare for their defence
- Securing the system from future attacks
- Metasploit exploitation
- Firewall and IDS for securing network systems
- Post exploitation procedures
- Security design principles
MODULE OVERVIEW
Module 1: Introduction to Penetration Testing (Pen Testing)
Module 2: Information Gathering
Module 3: Scanning the Systems to Know the Loop Holes
Module 4: Applying Enumeration Techniques on the Network Systems
Module 5: Performing the Threat and Vulnerabilities Assessment Using Metasploit
Module 6: Exploiting the Systems to Prepare for Defence
Module 7: Exploiting Web Apps
Module 8: Preventing Systems Using Strong Passwords Techniques
Module 9: Performing Pen Testing on Mobile Devices
Module 10: Advanced Exploitation Techniques
Module 11: Performing Analysis and Documentation”
PREREQUISITES
- T professionals and anyone who is interested in penetration testing