×
Phoenix TS

Penetration Testing: Procedures & Methodologies

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Course Overview

Our four day, Penetration Testing: Procedures & Methodologies course will cover the following topics in depth: methodologies, legal aspects, planning and scheduling, external and internal penetration testing, firewall and ids penetration testing as well as penetration testing of laptops, PDA’s, cellphones, e-mail, and security patches. This course is designed to expose students to groundbreaking methodologies in conducting thorough information security analysis, as well as advanced penetration testing techniques. Through expert lecture and interactive exercises, students will be able to perform the intensive assessments required to effectively identify and mitigate risks to the security of the organization’s infrastructure. At the completion of this course, participants will be able to:

  • Understand what pen testing is and how it’s used
  • Meet modern standards for comprehensive and effective testing
  • Review cryptography essentials every pen tester must know
  • Perform reconnaissance with Nmap, Google searches, and ShodanHq
  • Use malware as part of your pen testing toolkit
  • Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry
  • Pen test websites and web communication
  • Recognize SQL injection and cross-site scripting attacks
  • Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBS
  • Identify Linux vulnerabilities and password cracks
  • Use Kali Linux for advanced pen testing
  • Apply general hacking techniques such as fake Wi-Fi hotspots and social engineering
  • Systematically test your environment with Metasploit
  • Write or customize sophisticated Metasploit exploits

Schedule

Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.

Course Outline

Module 1: Introduction to Penetration Testing

Module 2: Standards

Module 3: Cryptography

Module 4: Reconnaissance

Module 5: Malware

Module 6: Hacking Windows

Module 7: Web Hacking

Module 8: Vulnerability Scanning

Module 9: Introduction to Linux

Module 10: Linux Hacking

Module 11: Introduction to Kali Linux

Module 12: General Hacking Techniques

Module 13: Introduction to Metasploit

Module 14: More with Metasploit

Module 15: Introduction to Scripting with Ruby

Module 16: General Hacking Knowledge

Module 17: Additional Pen Testing Topics

Module 18: A Sample Pen Test Project

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org

Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!

Name