Get in Touch

Course Outline

Upon completion of this course, you will be able to demonstrate knowledge and understanding of:

  • Penetration Testing Process and Types
  • Vulnerability Assessment
  • Internal and External Network Penetration Testing
  • Penetration Testing of Firewalls, IPS/IDS, Servers, Wireless Networks, and Cloud Environments
  • Network CTF
  • Wireless CTF
  • Web Application CTF
  • Servers CTF

Requirements

A solid understanding of TCP/IP protocols is required. Programming knowledge is not necessary. Participants should have a strong interest in Ethical Hacking and desire comprehensive penetration testing training.

 14 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories