In today’s ever changing threat landscape, it’s a challenging task for the IT Infrastructure team to ensure that their IT systems are secured against sophisticated and damaging cyber threats. Even after deploying multiple layers of security controls, the organizations have a concern on whether hackers can break into their defense to potentially compromise their critical systems and data. The objective of penetration testing is to determine if unauthorized access to critical systems and information can be achieved. Penetration Testers help the organizations to address these concerns by simulating the attack scenarios on the existing IT infrastructure. They exploit the vulnerabilities on the existing systems, gain access into the network, and escalate the privileges so as to have full control of the targeted server or application.

  • Penetration Testing (PT) Overview
  • The need and benefits of Penetration Testing
  • Types of Penetration Testing
  • Penetration Testing Ethics and Code of conduct
  • Penetration Testing Phases
    1. Reconnaissance
    2. Scanning
    3. Gaining Access
    4. Maintaining Access
    5. Covering Tracks
  • Penetrating Testing Tools
    1. Installation
    2. Configuration
    3. Setting up a PT Lab
    4. Understand the various tools and their features/commands
    5. How to use tools to perform the various PT phases
  • Penetrating Testing Reporting

The classroom training is usually scheduled between Fri – Sun

Please click here for more details on the locationwise schedule