Description
Duration: 5 days
This five-day course is intended to prepare students for a career in protecting organizations and their customer’s from breaches in privacy and security.
Penetration testing is becoming a valuable asset in CyberSecurity as organizations continue their efforts to prevent privacy and security breaches before they occur. This course will give students an introduction to the general and methodologies in relation to Pen Testing.
Upon completion of this course, students will have:
- Knowledge and skills required to plan and scope an assessment
- Understand legal and compliance requirements
- Perform vulnerability scanning and penetration testing
- Analyze data
- Effectively report and communicate skills
Possible career paths after completing this course:
- Penetration tester
- Vulnerability tester
- Security Analyst (II)
- Vulnerability Assessment Analyst
- Network Security Operations
- Application Security Vulnerability
Prerequisites
Before taking this course, it is recommended that students:
Have equivalent knowledge of or certification in Network+ or Security+
3-4 years of hands-on information security or related experience
What’s included?
- Authorized Courseware
- Intensive Hands on Skills Development with an Experienced Subject Matter Expert
- Hands-on practice on real Servers and extended lab support 1.800.482.3172
- Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
- Academy Code of Honor: Test Pass Guarantee
- Optional: Package for Hotel Accommodations, Lunch and Transportation
With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.
Methods
- Instructor Led (the best training format we offer)
- Live Online Classroom – Online Instructor Led
- Self-Paced Video
Speak to an Admissions Representative for complete details
Start | Finish | Public Price | Public Enroll | Private Price | Private Enroll |
---|---|---|---|---|---|
9/23/2024 | 9/27/2024 | ||||
10/14/2024 | 10/18/2024 | ||||
11/4/2024 | 11/8/2024 | ||||
11/25/2024 | 11/29/2024 | ||||
12/16/2024 | 12/20/2024 | ||||
1/6/2025 | 1/10/2025 | ||||
1/27/2025 | 1/31/2025 | ||||
2/17/2025 | 2/21/2025 | ||||
3/10/2025 | 3/14/2025 | ||||
3/31/2025 | 4/4/2025 | ||||
4/21/2025 | 4/25/2025 | ||||
5/12/2025 | 5/16/2025 | ||||
6/2/2025 | 6/6/2025 | ||||
6/23/2025 | 6/27/2025 | ||||
7/14/2025 | 7/18/2025 | ||||
8/4/2025 | 8/8/2025 | ||||
8/25/2025 | 8/29/2025 | ||||
9/15/2025 | 9/19/2025 | ||||
10/6/2025 | 10/10/2025 | ||||
10/27/2025 | 10/31/2025 | ||||
11/17/2025 | 11/21/2025 | ||||
12/8/2025 | 12/12/2025 | ||||
12/29/2025 | 1/2/2026 |
Curriculum
Module 1: Planning and Scoping Penetration Tests
Introduction to Penetration Testing Concepts
Plan a Pen Test Engagement
Scope and negotiate a Pen Test Engagement
Prepare for a Pen Test Engagement
Module 2: Conducting Passive Reconnaissance
Gather Background Information
Prepare Background findings for Next Steps
Module 3: Performing Non-Technical Tests
Perform Social Engineering Tests
Perform Physical Security Tests on Facilities
Module 4: Conducting Active Reconnaissance
Scan Networks
Enumerate Targets
Scan for vulnerabilities
Analyze Basic Scripts
Module 5: Analyzing Vulnerabilities
Analyze Vulnerability Scan Results
Leverage Information to prepare for exploitation
Module 6: Penetrating Networks
Exploit Network-Based Vulnerabilities
Exploit Wireless and RF-Based Vulnerabilities
Exploit Specialized Systems
Module 7: Exploiting Host-Based Vulnerabilities
Exploit Windows-Based Vulnerabilities
Exploit Nix-Based Vulnerabilities
Module 8: Testing Applications
Exploit Web Application Vulnerabilities
Test Source Code and Complied Apps
Module 9: Completing Post-Exploit Tasks
Use Lateral Movement Techniques
Use Persistence Techniques
Use Anti-Forensics Techniques
Module 10: Analyzing and Reporting Pen Test Results
Analyze Pen Test Data
Develop Recommendations for Mitigation Strategies
Write and Handle Reports
Conduct Post-Report-Delivery Activities