Course: Penetration Testing

Duration: 35 Hours


About this course:

         The Penetration Testing Course by EC-Council was devised as the next level course post completion of Security analyst (Practical) to enable those who want to challenge and question the Licensed Penetration Tester (Master) certification . They then can be recognized as “cliché” penetration testing professionals. Our training has been conceptualized by the industry’s top experts, who brainstormed to develop the kind of skill that you’ve been waiting to acquire.


         Penetration testing training is not comfortable (and the exam is even worse!), but filled with intense stress meant to illicit the best from you. Those who prevail will have developed an instinctual and intellectual response to real world penetration testing challenges.


Target Audience:

          » Network server administrators, Firewall Administrators, Information Security Testers, System Administrators and Risk Assessment professionals.

          » Pen testers.


Prerequisites:

                  To be eligible to apply to sit for the Penetration testing(Master) Exam, candidate must either.

          » Hold an Security analyst (Practical) or Penetration testing in good standing (Your USD100 application fee will be waived);

          » or Have a minimum of 2 years working experience in pen testing (You will need to pay USD100 as a non-refundable application fee);

          » or Have any other approved industry certifications such as OSCP or GPEN cert (You will need to pay USD100 as a non-refundable application fee)

          »Know basic network terminology and functions (such as OSI Model, Topology, and Ethernet, WI-Fi, switches, and routers).

          » Understand TCP/IP addressing, core protocols, and troubleshooting tool.



Course Outline:
Modules

           Module 01   Introduction to Vulnerability Assessment and Penetration Testing

           Module 02   Information Gathering Methodology

           Module 03    Scanning and Enumeration

           Module 04   Identify Vulnerabilities

           Module 05   Exploitation

           Module 06    Post Exploitation

           Module 07    Advanced Tips and Techniques

           Module 08    Preparing a Report

           Module 09   Practice Ranges


Delivery method: Classroom / Attend from Anywhere

Contact Us