Please accept cookies to help us improve this website Is this OK? Yes No More on cookies »
Item number: 141723762

Ethical Hacking Essentials (EHE) Training

Item number: 141723762

Ethical Hacking Essentials (EHE) Training

275,00 332,75 Incl. tax

EHE training is designed to give you a strong foundation in the techniques and tools ethical hackers use to identify and address security vulnerabilities.

Read more
Availability:
In stock
Delivery time:
Ordered before 5 p.m.! Start today.
  • Award Winning E-learning
  • Lowest price guarantee
  • Personalized service by our expert team
  • Pay safely online or by invoice
  • Order and start within 24 hours

Ethical Hacking Essentials (EHE) Training

Ethical Hacking Essentials is an Introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals. It offers hands-on experience in computer and network security concepts such as threats, vulnerabilities, password cracking, web applications, and more. Test your learnings with CTF-based Capstone Projects and validate your newly acquired skills in proctored exams. With 15 hours of premium learning, 11 labs, and 12 modules, the E|HE provides a solid foundation and formal recognition to boost your resume and open doors for better opportunities.

Course content

Module 01: Information Security Fundamentals

Discuss Information Security Fundamentals
         o What is Information Security?
         o Need for Security
         o Elements of Information Security
         o The Security, Functionality, and Usability Triangle
         o Security Challenges
         o Motives, Goals, and Objectives of Information Security Attacks
         o Classification of Attacks
         o Information Security Attack Vectors

Discuss Various Information Security Laws and Regulations
         o Payment Card Industry Data Security Standard (PCI DSS)
         o ISO/IEC 27001:2013
         o Health Insurance Portability and Accountability Act (HIPAA)
         o Sarbanes Oxley Act (SOX)
         o The Digital Millennium Copyright Act (DMCA)
         o The Federal Information Security Management Act (FISMA)
         o General Data Protection Regulation (GDPR)
         o Data Protection Act 2018 (DPA)
         o Cyber Law in Different Countries

Module 02: Ethical Hacking Fundamentals

Understand Cyber Kill Chain Methodology
         o Cyber Kill Chain Methodology
         o Tactics, Techniques, and Procedures (TTPs)
         o Adversary Behavioral Identification
         o Indicators of Compromise (IoCs)
                  • Categories of Indicators of Compromise

Discuss Hacking Concepts and Hacker Classes
         o What is Hacking?
         o Who is a Hacker?
         o Hacker Classes/Threat Actors
                  • Black Hats
                  • White Hats
                  • Gray Hats
                  • Suicide Hackers
                  • Script Kiddies
                  • Cyber Terrorists
                  • State-Sponsored Hackers
                  • Hacktivist
                  • Hacker Teams
                  • Industrial Spies
                  • Insider
                  • Criminal Syndicates
                  • Organized Hackers

Understand Different Phases of Hacking Cycle
         o Hacking Phase: Reconnaissance
         o Hacking Phase: Scanning
         o Hacking Phase: Gaining Access
         o Hacking Phase: Maintaining Access
         o Hacking Phase: Clearing Tracks

Discuss Ethical Hacking Concepts, Scope, and Limitations
         o What is Ethical Hacking?
         o Why Ethical Hacking is Necessary
         o Scope and Limitations of Ethical Hacking
         o Skills of an Ethical Hacker

Ethical Hacking Tools
         o Reconnaissance Using Advanced Google Hacking Techniques
         o Reconnaissance Tools
         o Scanning Tools
         o Enumeration Tools

Lab Exercise

         o Perform Passive Footprinting to Gather Information About a Target
                  • Gather Information using Advanced Google Hacking Techniques
                  • Extract a Company’s Data using Web Data Extractor
                  • Perform Whois Lookup using DomainTools
         o Perform Network Scanning to Identify Live Hosts, Open Ports and Services and
Target OS in the Network
                  • Perform Network Tracerouting in Windows and Linux Machines
                  • Perform Host Discovery using Nmap
                  • Perform Port and Service Discovery using MegaPing
                  • Perform OS Discovery using Unicornscan
         o Perform Enumeration on a System or Network to Extract Usernames, Machine
Names, Network Resources, Shares, etc.
                  • Perform NetBIOS Enumeration using Windows Command-Line Utilities
                  • Perform NetBIOS Enumeration using NetBIOS Enumerator

Module 03: Information Security Threats and Vulnerability Assessment

Define Threat and Threat Sources
         o What is a Threat?
         o Threats Sources
                  • Natural
                  • Unintentional
                  • Intentional
                    ➢ Internal
                    ➢ External
Define Malware and its Types
         o Introduction to Malware
         o Different Ways for Malware to Enter a System
         o Common Techniques Attackers Use to Distribute Malware on the Web
         o Components of Malware
         o Types of Malware
                  • Trojans
                    ✓ What is a Trojan?
                    ✓ Indications of Trojan Attack
                    ✓ How Hackers Use Trojans
                    ✓ Common Ports used by Trojans
                    ✓ Types of Trojans
                    ✓ Creating a Trojan
                  • Virus
                    ✓ What is a Virus?
                    ✓ Purpose of Creating Viruses
                    ✓ Indications of Virus Attack
                    ✓ Stages of Virus Lifecycle
                    ✓ How does a Computer Get Infected by Viruses?
                    ✓ Types of Viruses
                    ✓ Creating a Virus
                  • Ransomware
                  • Computer Worms
                    ✓ How is a Worm Different from a Virus?
                    ✓ Worm Makers
                  • Rootkits
                  • Potentially Unwanted Application or Applications (PUAs)
                    ✓ Adware
                  • Spyware
                  • Keylogger
                    ✓ What a Keylogger can Do?
                  • Botnets
                    ✓ Why Attackers use Botnets?
                  • Fileless Malware
                     ✓ Reasons for Using Fileless Malware in Cyber Attacks
                     ✓ Fileless Propagation Techniques
         o Malware Countermeasures
                  • Trojan Countermeasures
                  • Virus and Worm Countermeasures
                  • Rootkit Countermeasures
                  • Spyware Countermeasures
                  • PUAs/ Adware Countermeasures
                  • Keylogger Countermeasures
                  • Fileless Malware Countermeasures

Lab Exercise

         o Create a Trojan to Gain Access to the Target System
                  • Create a Trojan Server using Theef RAT Trojan
                  • Gain Control over a Victim Machine using the njRAT RAT Trojan
         o Create a Virus to Infect the Target System
                  • Create a Virus using the JPS Virus Maker Tool and Infect the Target System

Define Vulnerabilities
         o What is Vulnerability?
         o Vulnerability Classification
         o Examples of Network Security Vulnerabilities
         o Impact of Vulnerabilities

Define Vulnerability Assessment
         o Vulnerability Research
         o Resources for Vulnerability Research
         o What is Vulnerability Assessment?
         o Information Obtained from the Vulnerability Scanning
         o Vulnerability Scanning Approaches
         o Vulnerability Scoring Systems and Databases
                  • Common Vulnerability Scoring System (CVSS)
                  • Common Vulnerabilities and Exposures (CVE)
                  • National Vulnerability Database (NVD)
                  • Common Weakness Enumeration (CWE)
         o Types of Vulnerability Assessment
         o Vulnerability-Management Life Cycle
         o Vulnerability Assessment Tools
         o Vulnerability Exploitation

Lab Exercise

         o Perform Vulnerability Assessment to Identify Security Vulnerabilities in the Target
System or Network
                  • Perform Vulnerability Analysis using OpenVAS

Module 04: Password Cracking Techniques and Countermeasures

Discuss Password Cracking Techniques
         o Password Cracking
         o Password Complexity
         o Microsoft Authentication
         o Types of Password Attacks
                  • Active Online Attacks
                    ✓ Dictionary Attack
                    ✓ Brute-Force Attack
                    ✓ Rule-based Attack
                    ✓ Password Guessing
                    ✓ Default Passwords
                    ✓ Trojans/Spyware/Keyloggers
                    ✓ Hash Injection/Pass-the-Hash (PtH) Attack
                    ✓ LLMNR/NBT-NS Poisoning
                    ✓ Pass the Ticket Attack
                  • Passive Online Attacks
                    ✓ Wire Sniffing
                    ✓ Man-in-the-Middle
                    ✓ Replay Attacks
                  • Offline Attacks
                    ✓ Rainbow Table Attack
                   • Non-Electronic Attacks

Lab Exercise

         o Perform Active Online Attack to Crack the System’s Password
                  • Perform Active Online Attack to Crack the System’s Password using Responder
Discuss Password Cracking Tools
         o Password-Cracking Tools
                  • L0phtCrack
                  • ophcrack
                  • RainbowCrack

Lab Exercise

         o Audit System Passwords
                  • Audit System Passwords using L0phtCrack
                  • Audit System Passwords using John the Ripper
Discuss Password Cracking Countermeasures
         o Password Cracking Countermeasures

Module 05: Social Engineering Techniques and Countermeasures

Discuss Social Engineering Concepts and its Phases
         o What is Social Engineering?
         o Common Targets of Social Engineering
         o Impact of Social Engineering Attack on an Organization
         o Behaviors Vulnerable to Attacks
         o Factors that Make Companies Vulnerable to Attacks
         o Why is Social Engineering Effective?
         o Phases of a Social Engineering Attack

Discuss Social Engineering Techniques
         o Types of Social Engineering
                  • Human-based Social Engineering
                    ✓ Impersonation
                    ✓ Impersonation (Vishing)
                    ✓ Eavesdropping
                    ✓ Shoulder Surfing
                    ✓ Dumpster Diving
                    ✓ Reverse Social Engineering
                    ✓ Piggybacking
                    ✓ Tailgating
                  • Computer-based Social Engineering
                    ✓ Pop-Up Windows
                    ✓ Hoax Letters
                    ✓ Chain Letters
                    ✓ Instant Chat Messenger
                    ✓ Spam Email
                    ✓ Scareware
                    ✓ Phishing
                       ➢ Examples of Phishing Emails
                       ➢ Types of Phishing
                       ➢ Phishing Tools
                  • Mobile-based Social Engineering
                    ✓ Publishing Malicious Apps
                    ✓ Repackaging Legitimate Apps
                    ✓ Fake Security Applications
                    ✓ SMiShing (SMS Phishing)

Lab Exercise

         o Perform Social Engineering using Various Techniques to Sniff Users' Credentials
                  • Sniff Credentials using the Social-Engineer Toolkit (SET)

Discuss Insider Threats and Identity Theft
         o Insider Threats/Insider Attacks
                  • Reasons for Insider Attacks
                  • Types of Insider Threats
                  • Why are Insider Attacks Effective?
         o Identity Theft
                  • Types of Identity Theft
Discuss Various Social Engineering Countermeasures
         o Social Engineering Countermeasures
         o Insider Threats Countermeasures
         o Identity Theft Countermeasures
         o How to Detect Phishing Emails?
         o Anti-Phishing Toolbar
         o Social Engineering Tools
                  • Audit Organization's Security for Phishing Attacks using OhPhish

Lab Exercise

         o Detect a Phishing Attack
                 • Detect Phishing using Netcraft

Module 06: Network Level Attacks and Countermeasures

Sniffing

Understand Packet Sniffing Concepts
         o Packet Sniffing
         o How a Sniffer Works
         o Types of Sniffing
                  • Passive Sniffing
                  • Active Sniffing
         o How an Attacker Hacks the Network Using Sniffers
         o Protocols Vulnerable to Sniffing

Discuss Sniffing Techniques
         o MAC Flooding
         o DHCP Starvation Attack
         o ARP Spoofing Attack
                   • ARP Poisoning Tools
         o MAC Spoofing/Duplicating
         o DNS Poisoning
         o Sniffing Tools
                  • Wireshark

Lab Exercise

         o Perform MAC Flooding to Compromise the Security of Network Switches
                  • Perform MAC Flooding using macof
         o Perform ARP Poisoning to Divert all Communication between Two Machines
                  • Perform ARP Poisoning using arpspoof

Discuss Sniffing Countermeasures
         o Sniffing Countermeasures
         o Sniffer Detection Techniques
                  • Ping Method
                  • DNS Method
                  • ARP Method

Lab Exercise

         o Detect ARP Attacks using ARP Spoofing Detection Tools to Ensure Data Privacy
                  • Detect ARP Poisoning in a Switch-Based Network Denial-of-Service

Discuss Types of DoS and DDoS Attacks
         o What is a DoS Attack?
         o What is a DDoS Attack?
         o DoS/DDoS Attack Techniques
                  • UDP Flood Attack
                  • ICMP Flood Attack
                  • Ping of Death
                  • Smurf Attacks
                  • SYN Flood Attack
                  • Fragmentation Attack
                  • Multi-Vector Attack
                  • Peer-to-Peer Attack
                  • Permanent Denial-of-Service Attack
                  • Distributed Reflection Denial-of-Service (DRDoS) Attack
         o DoS/DDoS Attack Tools

Lab Exercise

         o Perform DoS and DDoS Attacks using Various Techniques on a Target Host to
Prevents Access to System Resources for Legitimate Users
                  • Perform a DoS Attack on a Target Host using hping3
                  • Perform a DDoS Attack using HOIC

Discuss DoS and DDoS Attack Countermeasures
         o Dos/DDoS Attack Countermeasures
         o DoS/DDoS Protection Tools

Lab Exercise

         o Detect and Protect Against DDoS Attack
                  • Detect and Protect against DDoS Attack using Anti DDoS Guardian

Session Hijacking
Discuss Types Session Hijacking Attacks
         o What is Session Hijacking?
         o Why is Session Hijacking Successful?
         o Session Hijacking Process
         o Types of Session Hijacking
         o Session Hijacking in OSI Model
         o Spoofing vs. Hijacking
         o Session Hijacking Tools

Lab Exercise

         o Perform Session Hijacking to Seize Control of a Valid TCP Communication Session
Between Two Computers
                  • Hijack a Session using Zed Attack Proxy (ZAP)

Discuss Session Hijacking Attack Countermeasures
         o Session Hijacking Detection Methods
         o Session Hijacking Countermeasures
         o Session Hijacking Detection Tools

Lab Exercise

         o Detect Session Hijacking Attempts using Manual Method
                  • Detect Session Hijacking using Wireshark

Module 07: Web Application Attacks and Countermeasures

Web Server Attacks

Discuss Various Web Server Attacks
         o Web Server Operations
         o Web Server Components
         o Web Server Security Issues
         o Impact of Web Server Attacks
         o Why are Web Servers Compromised?
         o Web Server Attacks
                  • DNS Server Hijacking
                  • DNS Amplification Attack
                  • Directory Traversal Attacks
                  • Website Defacement
                  • Web Server Misconfiguration
                  • HTTP Response-Splitting Attack
                  • Web Cache Poisoning Attack
                  • SSH Brute Force Attack
                  • Web Server Password Cracking
                  • Server-Side Request Forgery (SSRF) Attack
         o Web Server Attack Tools

Lab Exercise

         o Perform a Web Server Attack to Crack FTP Credentials
                  • Crack FTP Credentials using a Dictionary Attack
Discuss Web Server Attack Countermeasures
         o Web Server Attack Countermeasures
         o Web Server Security Tools

Web Application Attacks
Understand Web Application Architecture and Vulnerability Stack
         o Introduction to Web Applications
                  • How Web Application Work
         o Web Application Architecture
         o Web Services
                  • Types of Web Services
         o Vulnerability Stack

Discuss Web Application Threats and Attacks
         o OWASP Top 10 Application Security Risks – 2017
                  • A1 - Injection Flaws
                  • A2 - Broken Authentication
                  • A3 - Sensitive Data Exposure
                  • A4 - XML External Entity (XXE)
                  • A5 - Broken Access Control
                  • A6 - Security Misconfiguration
                  • A7 - Cross-Site Scripting (XSS) Attacks
                  • A8 - Insecure Deserialization
                  • A9 - Using Components with Known Vulnerabilities
                  • A10 - Insufficient Logging and Monitoring
         o Web Application Attack Tools

Lab Exercise

         o Perform a Web Application Attack to Compromise the Security of Web
Applications to Steal Sensitive Information
                  • Perform Parameter Tampering using Burp Suite

Discuss Web Application Attack Countermeasures
         o Web Application Attack Countermeasures
         o Web Application Security Testing Tools
SQL Injection Attacks
Discuss Types of SQL Injection Attacks
         o What is SQL Injection?
         o Why Bother about SQL Injection?
         o SQL Injection and Server-side Technologies
         o Types of SQL injection
                  • In-Band SQL Injection
                    ➢ Error Based SQL Injection
                    ➢ Union SQL Injection
                  • Blind/Inferential SQL Injection
                    ➢ Blind SQL Injection: No Error Message Returned
                    ➢ Blind SQL Injection: WAITFOR DELAY (YES or NO Response)
                    ➢ Blind SQL Injection: Boolean Exploitation
                    ➢ Blind SQL Injection: Heavy Query
                  • Out-of-Band SQL injection
         o SQL Injection Tools

Lab Exercise

         o Perform SQL Injection Attacks on a Target Web Application to Manipulate the
Backend Database
                    • Perform an SQL Injection Attack Against MSSQL to Extract Databases using sqlmap

Discuss SQL Injection Attack Countermeasures
         o SQL Injection Attack Countermeasures
         o SQL Injection Detection Tools

Lab Exercise

         o Detect SQL Injection Vulnerabilities using SQL Injection Detection Tools
                      • Detect SQL Injection Vulnerabilities using DSSS

Module 08: Wireless Attacks and Countermeasures

Understand Wireless Terminology
         o Wireless Terminology
         o Wireless Networks
                  • Types of Wireless Networks
         o Wireless Standards

Discuss Different Types of Wireless Encryption
         o Types of Wireless Encryption
                  • Wired Equivalent Privacy (WEP) Encryption
                  • Wi-Fi Protected Access (WPA) Encryption
                  • WPA2 Encryption
                  • WPA3 Encryption
         o Comparison of WEP, WPA, WPA2, and WPA3

Describe Wireless Network-specific Attack Techniques
         o Rogue AP Attack
         o Client Mis-association
         o Misconfigured AP Attack
         o Unauthorized Association
         o Ad-Hoc Connection Attack
         o Honeypot AP Attack
         o AP MAC Spoofing
         o Key Reinstallation Attack (KRACK)
         o Jamming Signal Attack
         o Wi-Fi Jamming Devices
         o Cracking WEP Using Aircrack-ng
         o Cracking WPA-PSK Using Aircrack-ng
         o Wireless Attack Tools
                  • Aircrack-ng Suite
                  • AirMagnet WiFi Analyzer PRO

Lab Exercise

         o Perform Wi-Fi Packet Analysis
                  • Wi-Fi Packet Analysis using Wireshark
         o Perform Wireless Attacks to Crack Wireless Encryption
                  • Crack a WEP Network using Aircrack-ng
                  • Crack a WPA2 Network using Aircrack-ng

Understand Bluetooth Attacks
         o Bluetooth Stack
         o Bluetooth Modes
         o Bluetooth Hacking
         o Bluetooth Threats
         o Bluetooth Attack Tools
Discuss Wireless Attack Countermeasures
         o Wireless Attack Countermeasures
         o Bluetooth Attack Countermeasures
         o Wireless Security Tools

Module 09: Mobile Attacks and Countermeasures

Understand Mobile Attack Anatomy
         o Vulnerable Areas in Mobile Business Environment
         o OWASP Top 10 Mobile Risks – 2016
         o Anatomy of a Mobile Attack
         o How a Hacker can Profit from Mobile Devices that are Successfully Compromised

Discuss Mobile Platform Attack Vectors and Vulnerabilities
         o Mobile Attack Vectors
         o Mobile Platform Vulnerabilities and Risks
         o Security Issues Arising from App Stores
         o App Sandboxing Issues
         o Mobile Spam
         o SMS Phishing Attack (SMiShing) (Targeted Attack Scan)
                   • Why is SMS Phishing Effective?
                   • SMS Phishing Attack Examples
         o Pairing Mobile Devices on Open Bluetooth and Wi-Fi Connections
         o Agent Smith Attack
         o Exploiting SS7 Vulnerability
         o Simjacker: SIM Card Attack
         o Hacking an Android Device Using Metasploit
         o Android Hacking Tools
         o iOS Hacking Tools

Lab Exercise

         o Hack an Android Device by Creating Binary Payloads
                  • Hack an Android Device by Creating Binary Payloads using Parrot Security

Understand Mobile Device Management (MDM) Concept
         o Mobile Device Management (MDM)
         o Bring Your Own Device (BYOD)
                  • BYOD Risks

Discuss Mobile Attack Countermeasures
         o OWASP Top 10 Mobile Controls
         o General Guidelines for Mobile Platform Security
         o Mobile Security Tools

Lab Exercise

         o Secure Android Devices using Various Android Security Tools
                  • Secure Android Devices from Malicious Apps using Malwarebytes Security

Module 10: IoT and OT Attacks and Countermeasures

IoT Attacks

Understand IoT Concepts
         o What is the IoT?
         o How the IoT Works
         o IoT Architecture
         o IoT Application Areas and Devices

Discuss IoT Threats and Attacks
         o Challenges of IoT
         o IoT Security Problems
         o OWASP Top 10 IoT Threats
         o IoT Threats
         o Hacking IoT Devices: General Scenario
         o IoT Attacks
                  • DDoS Attack
                  • Exploit HVAC
                  • Rolling Code Attack
                  • BlueBorne Attack
                  • Jamming Attack
                  • Hacking Smart Grid/Industrial Devices: Remote Access using Backdoor
                  • SDR-Based Attacks on IoT
                  • Fault Injection Attacks
         o Capturing and Analyzing IoT Traffic using Wireshark
         o IoT Attack Tools

Lab Exercise

         o Perform Footprinting using Various Footprinting Techniques
                  • Gather Information using Online Footprinting Tools
         o Capture and Analyze IoT Device Traffic
                  • Capture and Analyze IoT Traffic using Wireshark

Discuss IoT Attack Countermeasures
         o IoT Attack Countermeasures
         o IoT Security Tools

OT Attacks
Understand OT Concepts
         o What is OT?
         o Essential Terminology
         o IT/OT Convergence (IIOT)
         o The Purdue Model

Discuss OT Threats and Attacks
         o Challenges of OT
         o OT Threats
         o OT Attacks
                  • HMI-based Attacks
                  • Side-Channel Attacks
                  • Hacking Programmable Logic Controller (PLC)
                  • Hacking Industrial Systems through RF Remote Controllers
                   ✓ Replay Attack
                   ✓ Command Injection
                   ✓ Re-pairing with Malicious RF controller
                   ✓ Malicious Reprogramming Attack
         o OT Attack Tools

Discuss OT Attack Countermeasures
         o OT Attack Countermeasures
         o OT Security Tools

Module 11: Cloud Computing Threats and Countermeasures

Understand Cloud Computing Concepts
         o Introduction to Cloud Computing
         o Types of Cloud Computing Services
         o Separation of Responsibilities in Cloud
         o Cloud Deployment Models
                  • Public Cloud
                  • Private Cloud
                  • Community Cloud
                  • Hybrid Cloud
                  • Multi Cloud
         o NIST Cloud Deployment Reference Architecture
         o Cloud Storage Architecture
         o Cloud Service Providers

Understand Container Technology
         o What is a Container?
         o Containers Vs. Virtual Machines
         o What is Docker?
         o Microservices Vs. Docker
         o Docker Networking
         o Container Orchestration
         o What is Kubernetes?
                  • Kubernetes Cluster Architecture
         o Kubernetes Vs. Docker
         o Container Security Challenges
         o Container Management Platforms
         o Kubernetes Platforms


Discuss Cloud Computing Threats
         o OWASP Top 10 Cloud Security Risks
         o Cloud Computing Threats
         o Cloud Attacks
                  • Side-Channel Attacks or Cross-guest VM Breaches
                  • Wrapping Attack
                  • Man-in-the-Cloud (MITC) Attack
                  • Cloud Hopper Attack
                  • Cloud Cryptojacking
                  • Cloudborne Attack
                  • Enumerating S3 Buckets using lazys3
         o Cloud Attack Tools

Lab Exercise

         o Perform S3 Bucket Enumeration using Various S3 Bucket Enumeration Tools
                  • Enumerate S3 Buckets using lazys3
         o Exploit S3 Buckets
                  • Exploit Open S3 Buckets using AWS CLI

Discuss Cloud Attack Countermeasures
         o Cloud Attack Countermeasures
         o Cloud Security Tools

Module 12: Penetration Testing Fundamentals

Understand Fundamentals of Penetration Testing and its Benefits
         o What is Penetration Testing?
         o Benefits of Conducting a Penetration Test
         o Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
         o Types of Penetration Assessment: Goal-oriented vs. Compliance-oriented vs. Red
team-oriented

Discuss Strategies and Phases of Penetration Testing
         o Strategies of Penetration Testing
                  • Black-box
                  • White-box
                  • Gray-box
         o Penetration Testing Process
         o Phases of Penetration Testing
         o Penetration Testing Methodologies

Guidelines and Recommendations for Penetration Testing
         o Characteristics of a Good Penetration Test
         o When should Pen Testing be Performed?
         o Ethics of a Penetration Tester
         o Evolving as a Penetration Tester
         o Qualification, Experience, Certifications, and Skills Required for a Pen Tester
                  • Communication Skills of a Penetration Tester
                  • Profile of a Good Penetration Tester
                  • Responsibilities of a Penetration Tester
         o Risks Associated with Penetration Testing
                  • Types of Risks Arising from Penetration Testing
                  • Addressing Risks Associated with Penetration Testing and Avoiding Potential
DoS Conditions

Lesson duration Variable
Language English
Certificate of participation Yes
Online access 1 year unlimited access
Progress monitoring Yes

There are no reviews written yet about this product.

Loading...

OEM Office Elearning Menu Top 2 in ICT-trainingen 2024!

OEM Office Elearning Menu is trots op de tweede plaats in de categorie ICT-trainingen 2024 bij Beste Opleider van Nederland (Springest/Archipel). Dank aan al onze cursisten voor hun vertrouwen!

Reviews

There are no reviews written yet about this product.

Combideals

25.000+

Springest: 9.1 - Edubookers 9.0

3500+

20+