See how Insoft Services is responding to COVID-19

Certified Penetration Testing Engineer

Certified Penetration Testing Engineer -
X

Contattaci

Ti preghiamo di compilare questo modulo per prenotare in anticipo o richiedere ulteriori informazioni sulle date disponiibili.

Iscriviti

Vorrei ricevere e-mail con gli ultimi aggiornamenti e le promozioni di Insoft.

Protezione dei dati e privacy

Con la presente autorizzo Insoft Ltd. a contattarmi su questo argomento. Inoltre, autorizzo Insoft Ltd. al trattamento dei miei dati personali, utilizzando la raccolta e la memorizzazione dei miei dati personali per lo scopo di queste attività. Tutti i vostri dati saranno protetti e protetti come indicato nella nostra politica sulla privacy.


5 Days Course
Network Security

Online

A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system.  You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system.    Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants.

In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk.

Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing.

Obiettivi

Upon completion, Certified Penetration Testing Engineer students will be able to test an information system for both physical and technical areas of weakness and offer recommendations for strengthening those areas.

Contenuti

  • Course Introduction
  • Module 1  – Business & Technical Logistics of Pen Testing
  • Module 2 – Information Gathering Reconnaissance – Passive (External Only)
  • Module 3 –  Detecting Live Systems – Reconnaissance (Active)
  • Module 4 –  Banner Grabbing and Enumeration
  • Module 5 –  Automated Vulnerability Assessment
  • Module 6 – Hacking Operating Systems
  • Module 7 – Advanced Assessment and Exploitation Techniques
  • Module 8 – Evasion Techniques
  • Module 9 –  Hacking with PowerShell
  • Module 10 –  Networks and Sniffing
  • Module 11 –  Accessing and Hacking Web Techniques
  • Module 12 – Mobile and IoT Hacking
  • Module 13 –  Report Writing Basics
  • Appendix: Linux Fundamentals

Pubblico di destinazione

  • Pen Testers
  • Ethical Hackers
  • Network Auditors
  • Cybersecurity Professionals
  • Vulnerability Assessors
  • Cybersecurity Managers
  • IS Managers