COURSE OBJECTIVE:
After completing this course you should be able to:
• Overcome some of the most advanced obstacles that real-world practitioners face when conducting penetration test. You will face the following challenges
• Advanced Windows Attacks
• Attacking IOT Systems
• Writing Exploits:Advanced Binaries Exploitation
• Bypassing a Filtered Network
• Pentesting Operational Technology (OT)
• Access Hidden Networks with Pivoting
• Double Pivoting
• Privilege Escalation
• Evading Defense Mechanisms
• Attack Automation with Scripts
• Build your own Armory: Weaponize your Exploits
• Write Professional Reports
TARGET AUDIENCE:
Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals,
COURSE PREREQUISITES:
Attendees should meet the following prerequisites:
• It is recommended not mandated that students have followed the EC-Council VAPT track and completed the CEH Course and CEH Practical exam before enrolling for this course.
• Advanced knowledge in Networking Protocols
• Knowledge in Kali or ParrotOS and common Penetration Testing Tools
• Knowledge in Exploiting Windows and Linux Hosts
• Knowledge in Privilege Escalation in Linux and Windows
• Knowledge in Wireless Penetration Testing
• Knowledge in Web Application Penetration Testing
COURSE CONTENT:
Module 01: Introduction to Penetration Testing
Module 02: Penetration Testing Scoping and Engagement
Module 03: Open Source Intelligence (OSINT)
Module 04: Social Engineering Penetration Testing
Module 05: Network Penetration Testing – External
Module 06: Network Penetration Testing– Internal
Module 07: Network Penetration Testing – Perimeter Devices
Module 08: Web Application Penetration Testing
Module 09: Wireless Penetration Testing
Module 10: IoT Penetration Testing
Module 11: OT/SCADA Penetration Testing
Module 12: Cloud Penetration Testing
Module 13: Binary Analysis and Exploitation
Module 14: Report Writing and Post Testing Actions
FOLLOW ON COURSES:
Not available. Please contact.