This course provides the knowledge needed to plan and perform penetration tests and other security engagements, using a vendor-neutral format. This includes planning engagements, performing reconnaissance to find vulnerabilities in a target organization, exploiting vulnerable targets, and creating follow-up reports.
How you’ll benefit This class will help you:
Learn general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company.
Why Attend with Current Technologies CLC
Our Instructors are in the top 10%
Our Lab has a dedicated 1 Gig Fiber Connection for our Labs
The job roles best suited to the material in this course are:
This course is intended if you plan to become a certified penetration tester, or if you are a security professional who wishes to understand cybersecurity from an offensive perspective.
To fully benefit from this course, you should have the following knowledge:
Intermediate knowledge of information security concepts, including but not limited to identity and access management (IAM), cryptographic concepts and implementations, computer networking concepts and implementations, and common security technologies.
Practical experience in securing various computing environments, including small to medium businesses, as well as enterprise environments.