Module 01: Introduction to Penetration Testing and Methodologies
Cover the fundamentals of penetration testing, including penetration testing approaches, strategies, methodologies, techniques, and various guidelines and recommendations for penetration testing.
Module 02: Penetration Testing Scoping and Engagement
Learn the different stages and elements of scoping and engagement in penetration testing.
Module 03: Open-Source Intelligence (OSINT)
Learn how to use techniques and tools to gather intelligence about the target from publicly available sources such as the World Wide Web (WWW), through website analysis, by using tools/frameworks/scripts, and so on.
Module 04: Social Engineering Penetration Testing
Learn different social engineering techniques and perform social-engineering penetration testing on a target organization.
Module 05: Network Penetration Testing – External
Learn how to implement a comprehensive penetration testing methodology for assessing networks from outsiders’ perspectives. Learn the process attackers follow to exploit the assets using vulnerabilities from the outside of the network perimeter.
Module 06: Network Penetration Testing – Internal
Learn how to implement a comprehensive penetration testing methodology for assessing networks from insider’s perspectives.
Module 07: Network Penetration Testing – Perimeter Devices
Learn how to implement a comprehensive penetration testing methodology for assessing the security of network perimeter devices, such as Firewalls, IDS, Routers, and Switches.
Module 08: Web Application Penetration Testing
Learn how to analyze web applications for various vulnerabilities, including the Open Web Application Security Project (OWASP) Top 10, and determine the risk of exploitation.
Module 09: Wireless Penetration Testing
Learn how to test various components of wireless networks, such as WLAN, RFID devices, and NFC technology devices.
Module 10: IoT Penetration Testing
Understand various threats to Internet of things (IoT) networks and learn how to audit security controls for various inherent IoT risks.
Module 11: OT and SCADA Penetration Testing
Understand OT and SCADA concepts and learn the process of testing various components of OT and SCADA networks
Module 12: Cloud Penetration Testing
Understand various security threats and concerns in cloud computing and learn how to perform cloud penetration testing to determine the probability of exploitation.
Module 13: Binary Analysis and Exploitation
Understand the binary analysis methodology and reverse engineer applications to identify vulnerable applications that may lead to the exploitation of an information system.
Module 14: Report Writing and Post Testing Actions
Learn how to document and analyze the results of a penetration test and recommend post-penetration test actions.
Additional Self-Study Modules
- Penetration Testing Essential Concepts
- Mastering Metasploit Framework
- Bash Environment and Scripting
- Perl Environment and Scripting
- Fuzzing
- PowerShell Scripting
- Python Environment and Scripting
- Ruby Environment and Scripting
- Active Directory Pen Testing
- Mobile Device Penetration Testing
- Database Penetration Testing