Loading...

Course Description

The student will understand the specialized set of tools, tactics, techniques, knowledge, skills, and abilities to facilitate the ability to think like an adversary and appropriately defend their systems. The student will be primarily focused on how to work with a penetration testers toolkit to identify vulnerable systems, services and configurations to identify and exploit vulnerabilities to apply the appropriate countermeasures. At the conclusion of the course the student will be proficient in performing ethical hacking and penetration tests on computer systems, networks, services and applications.

Learner Outcomes

  • Articulate the required planning & preparation for a penetration test.
  • Identify the difference between passive & active reconnaissance & vulnerability scanning.
  • Articulate how to research attack vectors & execute network attacks.
  • Articulate wireless attack methods, specific wireless attacks & its appropriate application.
  • Identify application attack vectors.
  • Articulate attacks against cloud technologies specifically account takeover, credential harvesting & privilege escalation.
  • Complete various cyber range exercises.
  • Articulate components of written penetration testing reports including appropriate recommendations & post-delivery activities.

Applies Towards the Following Certificates

Loading...
Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrollment. Please complete a Course Inquiry so that we may promptly notify you when enrollment opens.
Required fields are indicated by .