About the Course
Learn to understand the specialized set of tools, tactics, techniques, knowledge, skills, and abilities to facilitate the ability to think like an adversary and appropriately defend your systems. Focus on how to work with a penetration testers toolkit to identify vulnerable systems, services and configurations to identify and exploit vulnerabilities to apply the appropriate countermeasures. At the conclusion of the course, the student will be proficient in performing ethical hacking and penetration tests on computer systems, networks, services and applications.
- Articulate the required planning & preparation for a penetration test.
- Identify the difference between passive & active reconnaissance & vulnerability scanning.
- Articulate how to research attack vectors & execute network attacks.
- Articulate wireless attack methods, specific wireless attacks & its appropriate application.
- Identify application attack vectors.
- Articulate attacks against cloud technologies specifically account takeover, credential harvesting & privilege escalation.
- Complete various cyber range exercises.
- Articulate components of written penetration testing reports including appropriate recommendations & post-delivery activities.