Penetration testing, also called pen testing or ethical hacking, is that the practice of testing a computing system, network or web application to seek out security vulnerabilities that an attacker could exploit. Penetration testing are often automated with software applications or performed manually. Either way, the method involves gathering information about the target before the test, identifying possible entry points, attempting to interrupt in — either virtually or for real — and reporting back the findings.

The main objective of penetration testing is to spot security weaknesses. Penetration testing also can be wont to test an organization’s security policy, its adherence to compliance requirements, its employees’ security awareness and therefore the organization’s ability to spot and respond to security incidents.

Duration

5 days 40 hours

Module

  1. Introduction
  2. Networking
  3. Linux for pentesters
  4. Google Dorks
  5. OSINT
  6. Advanced scanning techniques
  7. Packet inspection
  8. Kali Linux
  9. Metasploit Framework
  10. Bypassing Firewalls
  11. Wireless Security
  12. Advanced Social Engineering Attacks
  13. Web application security
  14. Bug Bounty
  15. CTF challenges and Pentest projects

 

Enquire now