Course Outline
– Introduction to Penetration Testing and Methodologies
– Penetration Testing Scoping and Engagement Methodology
– Open Source Intelligence (OSINT) Methodology
– Social Engineering Penetration Testing Methodology
– Network Penetration Testing Methodology – External
– Network Penetration Testing Methodology – Internal
– Network Penetration Testing Methodology – Perimeter Devices
– Web Application Penetration Testing Methodology
– Database Penetration Testing Methodology
– Wireless Penetration Testing Methodology
– Cloud Penetration Testing Methodology
– Report Writing and Post Testing Actions
Target Audience:
Ethical Hackers, Penetration Testers, N/W Server Admins, Security Testers, System Admins.