BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Course Overview
Our four day, Penetration Testing: Procedures & Methodologies course will cover the following topics in depth: methodologies, legal aspects, planning and scheduling, external and internal penetration testing, firewall and ids penetration testing as well as penetration testing of laptops, PDA’s, cellphones, e-mail, and security patches. This course is designed to expose students to groundbreaking methodologies in conducting thorough information security analysis, as well as advanced penetration testing techniques. Through expert lecture and interactive exercises, students will be able to perform the intensive assessments required to effectively identify and mitigate risks to the security of the organization’s infrastructure. At the completion of this course, participants will be able to:
- Understand what pen testing is and how it’s used
- Meet modern standards for comprehensive and effective testing
- Review cryptography essentials every pen tester must know
- Perform reconnaissance with Nmap, Google searches, and ShodanHq
- Use malware as part of your pen testing toolkit
- Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry
- Pen test websites and web communication
- Recognize SQL injection and cross-site scripting attacks
- Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBS
- Identify Linux vulnerabilities and password cracks
- Use Kali Linux for advanced pen testing
- Apply general hacking techniques such as fake Wi-Fi hotspots and social engineering
- Systematically test your environment with Metasploit
- Write or customize sophisticated Metasploit exploits
Schedule
Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.
Course Outline
Module 1: Introduction to Penetration Testing
Module 2: Standards
Module 3: Cryptography
Module 4: Reconnaissance
Module 5: Malware
Module 6: Hacking Windows
Module 7: Web Hacking
Module 8: Vulnerability Scanning
Module 9: Introduction to Linux
Module 10: Linux Hacking
Module 11: Introduction to Kali Linux
Module 12: General Hacking Techniques
Module 13: Introduction to Metasploit
Module 14: More with Metasploit
Module 15: Introduction to Scripting with Ruby
Module 16: General Hacking Knowledge
Module 17: Additional Pen Testing Topics
Module 18: A Sample Pen Test Project
BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org