Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Core modules:
- Understanding the Need for Security Analysis
- Analyzing TCP/IP Packets
- Penetration Testing Methodologies
- Managing Customer Relations and Legal Agreements
- Establishing Rules of Engagement
- Planning and Scheduling Penetration Tests
- Pre-Penetration Testing Preparations
- Information Gathering Techniques
- Conducting Vulnerability Analysis
- Executing External Penetration Tests
- Performing Internal Network Penetration Tests
- Penetrating Firewall Defenses
- Intrusion Detection System (IDS) Penetration Testing
- Password Cracking Techniques
- Social Engineering Penetration Testing
- Web Application Penetration Testing
- SQL Injection and Penetration Testing
- Generating Penetration Test Reports and Post-Test Actions
Additional Modules:
- Router and Switch Penetration Testing
- Wireless Network Penetration Testing
- Denial-of-Service (DoS) Penetration Testing
- Securing Stolen Laptops, PDAs, and Cell Phones
- Source Code Security Analysis
- Physical Security Penetration Testing
- Penetrating Surveillance Camera Systems
- Database Penetration Testing
- VoIP Penetration Testing
- VPN Penetration Testing
- Cloud Infrastructure Penetration Testing
- Virtual Machine Penetration Testing
- War Dialling Techniques
- Detecting Viruses and Trojans
- Penetration Testing for Log Management
- File Integrity Verification
- Mobile Device Penetration Testing
- Telecommunication and Broadband Communication Security
- Email Security Penetration Testing
- Security Patch Vulnerability Analysis
- Data Leakage Prevention Testing
- SAP System Penetration Testing
- Adhering to Standards and Compliance Regulations
- Principles of Information System Security
- Incident Response for Information Systems
- Auditing and Certification of Information Systems
Requirements
No prerequisites are required.
35 Hours
Testimonials (3)
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
Hazem has a very recent experience passing the exam and knows the gotchas and the way how ISC structures their questions.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Certified Information System Security Professional (CISSP) CBK Review
Overview of Risk topics and preparing for exam