Penetration Testing
In today’s ever changing threat landscape, it’s a challenging task for the IT Infrastructure team to ensure that their IT systems are secured against sophisticated and damaging cyber threats. Even after deploying multiple layers of security controls, the organizations have a concern on whether hackers can break into their defence to potentially compromise their critical systems and data. The objective of penetration testing is to determine if unauthorised access to critical systems and information can be achieved. Penetration Testers help the organizations to address these concerns by simulating the attack scenarios on the existing IT infrastructure. They exploit the vulnerabilities on the existing systems, gain access into the network, and escalate the privileges so as to have full control of the targeted server or application.

Penetration Testing (PT) Overview
The need and benefits of Penetration Testing
Types of Penetration Testing
Penetration Testing Ethics and Code of conduct
Penetration Testing Phases
Reconnaissance
Scanning
Gaining Access
Maintaining Access
Covering Tracks
Penetrating Testing Tools
Installation
Configuration
Setting up a PT Lab
Understand the various tools and their features/commands
How to use tools to perform the various PT phases
Penetrating Testing Reporting