5 Days
- Information Security Analyst/Administrator
- Information Systems Security Engineer/Manager
- Information Security Professionals/Officers
- Information Security/IT Auditors
- Risk/Threat/Vulnerability Analyst
- System Administrators
- Network Administrators and Engineers
You will learn how to:
- Demonstrate a repeatable and measurable approach to Penetration Testing
- Perform advanced techniques and attacks to identify SQL injection, Cross site scripting (XSS),
- LFI, RFI vulnerabilities in web applications
- Perform privilege escalation to gain root access to a system Demonstrate ‘Out-of-the-box’
- and ‘lateral’ thinking
- Get access to proprietary EC-Council Penetration Testing methodologies
- Exploit vulnerabilities in Operating systems such as Windows, Linux
- Identify and bypass perimeter protections
- Perl, Python and Ruby scripting for the penetration tester
- Advanced post exploitation and persistence
- Extending Metasploit with custom modules and exploits
- Pivoting from external into internal networks
- Avoiding the most common mistakes when drafting a professional penetration testing report
- Introduction to Vulnerability Assessment and Penetration Testing
- Information Gathering Methodology
- Scanning and Enumeration
- Identify Vulnerabilities
- Exploitation
- Post Exploitation
- Advanced Tips and Techniques
- Preparing a Report
- Practice Ranges
This training prepares you for the following certification:
Licensed Penetration Tester