Course Outline
At the end of this course you will be able to demonstrate knowledge and understanding of:
- Penetration Testing Process and Types
- Vulnerability Assessment
- Internal and External Network Penetration Testing
- Firewall, IPS/IDS, Servers, Wireless, Cloud Penetration Testing
- Network CTF
- Wireless CTF
- Web Application CTF
- Servers CTF
Requirements
Firm understanding of the TCP/IP protocols.
Programming knowledge is NOT required
Desire to learn about Ethical Hacking, and get great penetration testing training
Testimonials (7)
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
Emin was really engaging and enthusiastic, his knowledge succeeded expectations and allowed for questions at each portion.
Becky
Course - OSINT Practitioner Course (Advanced OSINT)
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
Very good knowledge and character.
Constantinos Michael
Course - Java and Web Application Security
Pushing changes on an ongoing basis, when on the 3rd day I started to get more lost than before and it was harder to spot the error quickly, I was quickly able to check out the latest changes and stay up to date with the material
Paulina
Course - Advanced Java Security
Machine Translated
Very good to understand how a hacker would potentially analyse sites for weakness and tools they might employ .