Penetration Testing Training
Course Code: IFIS/SCA/CS004
About this Course
This is a high-pace, PRACTICAL and HANDS-ON training course that provides all the advanced skills required to carry out a thorough and professional penetration test against modern networks and infrastructure.
This course will equip participants with the knowledge to to assess and mitigate the risk at which their network is exposed by building strong, practical in-house skills.
This is not an introductory course and prior knowledge is required as per the pre-requisites.
Target Audience
- Application Developers
- Incident Handlers
- IDS Engineers
- Network and Systems Penetration Testers
Course Outline
Pre-engagement Interactions
- Introduction to scope
- Scoping Meeting
- Questionnaires
- Web Application Penetration Test
- Wireless Network Penetration Test
- Physical Penetration Test
- Social Engineering
- Scope Creep
Intelligence Gathering
- What is?
- Why do it?
- What is it not?
- Target selection
- OSINT
- Covert Gathering
- Footprinting
- Identify Protection Mechanism
Threat Modelling
- High Level threat Modelling
- Business Asset Analysis
- Business Process Analysis
- Threat Agents/Community analysis
- Threat capability analysis
- Motivation Modelling
Vulnerability Analysis
- Testing
- Active analysis
- Passive Analysis
- Validation
- Vulnerability Research
Exploitation
- Purpose
- Counter Measures
- Evasion
- Precision Strike
- Customized Exploitation
- Tailored Exploits
- Zero-Day Angle
- Avenues of Attack
- Overall Objective
Post Exploitation
- Infrastructure Analysis
- Pillaging
- High Value/ Profile Targets
- Data Exfiltration
- Persistence
Reporting
- Report Structure
- Executive Summary
- Technical Report
Additional Information
The student is required to have a modern laptop device that can support virtualization technologies. With a minimum of 8 GB RAM and 120 GB Of storage.
This is not an introductory course and students will be required to know the following;
- A working knowledge of ethical hacking.
- Virtualbox or VmWare virtualization technologies.
- Kali Linux and Metasploitable
- Basics of Bash, Python and the Linux Command Line.
- Host and Network Technologies.
- Those who have done theorectical international certifications and are looking for a hands-on approach.
- I.T Admins
- IDS Engineers
- Network and Systems Admins
- Anyone with an interest in the subject.
5 days, $500