In today’s ever changing threat landscape, it’s a challenging task for the IT Infrastructure team to ensure that their IT systems are secured against sophisticated and damaging cyber threats. Even after deploying multiple layers of security controls, the organizations have a concern on whether hackers can break into their defense to potentially compromise their critical systems and data. The goal of penetration testing is to determine if unauthorized access to critical systems and information can be achieved. If access is obtained, the vulnerabilities needs to be fixed and the penetration testing has to be re-performed until it is proved that the system no longer allows unauthorized access or other malicious activity.

Penetration Testers help the organizations to address these concerns by simulating the attack scenarios on the existing IT infrastructure. They exploit the vulnerabilities on the existing systems, gain access into the network, and escalate the privileges so as to have full control of the targeted server or application. Thus Penetration Testing enables organizations to identify the possible security gaps in Information Systems so that they s can strengthen their cyber security controls thereby minimizing the risks of real time cyber attacks.

Our Penetration Testing Foundational course helps you to build a strong understanding on the basics of penetration testing and prepares you to perform a penetration testing in a professional manner.

Topics Covered

  • Penetration Testing (PT) Overview
  • The need and benefits of Penetration Testing
  • Types of Penetration Testing
  • Penetration Testing Ethics and Code of conduct
  • Penetration Testing Phases
  • Penetrating Testing Tools
  • Penetrating Testing Reporting

Penetrating Testing Tools

  • Installation
  • Configuration
  • Setting up a PT Lab
  • Understand the various tools and their features/commands
  • How to use tools to perform the various PT phases

Penetration Testing Phases

  • Reconnaissance
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Covering Tracks

Who Should Attend

  • Site Administrators
  • Systems Administrators
  • Network Administrators
  • Webhosting Server Administrators
  • Web Developers and Designers
  • Students
  • Computer Science/IT Faculties
  • IS Auditors
  • Anyone who is concerned about protecting their the network infrastructure and data
  • Anyone who is seeking penetration testing as a career

Prerequisites

  • Should know how to use Web Browsers
  • Basic networking knowledge will be a plus
  • Should have a laptop (preferably with 8GB RAM with Windows 7 and above configuration) for installing PT tools and to practice class room exercises
Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Start typing and press Enter to search