Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Upon completion of this course, you will be able to demonstrate knowledge and understanding of:
- Penetration Testing Process and Types
- Vulnerability Assessment
- Internal and External Network Penetration Testing
- Penetration Testing of Firewalls, IPS/IDS, Servers, Wireless Networks, and Cloud Environments
- Network CTF
- Wireless CTF
- Web Application CTF
- Servers CTF
Requirements
A solid understanding of TCP/IP protocols is required. Programming knowledge is not necessary. Participants should have a strong interest in Ethical Hacking and desire comprehensive penetration testing training.
14 Hours