Course Overview
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.
Target audiences
- IT professionals looking to enhance their technical skills and knowledge
- Auditors looking to understand the Penetration Testing processes
- IT and Risk managers seeking a more detailed understanding of the appropriate and beneficial use of Penetration Tests
- Incident handlers and Business Continuity professionals looking to use testing as part of their testing regimes
- Penetration testers
- Ethical hackers
- Cybersecurity professionals
Schedule Dates
Curriculum
-
Course agenda
- Day 1: Introduction to Penetration Testing, ethics, planning and scoping
- Day 2: Technical foundation, knowledge and techniques (with practical exercises in all areas)
- Day 3: Conducting a Penetration Test (using tools and techniques) and reviewing testing areas
- Day 4: Analyzing results from testing, reporting and follow up
- Day 5: Certification Exam