Price:
$3,495.00
Days:
1
Virtual
– • Understand SOC operations, technologies, and workflows
– • Learn the full process of penetration testing and its role in cybersecurity
– • Plan, scope, and manage pen testing projects while following legal and ethical practices
– • Use OSINT tools to gather intelligence and analyze attack surfaces
– • Perform social engineering attacks and learn ways to prevent them
– • Test web applications for issues like SQL injection, XSS, and authentication flaws
– • Assess and fix API security problems such as misconfigurations and weak tokens
– • Bypass firewalls, IDS, and other network defenses using advanced evasion techniques
– • Exploit vulnerabilities in Windows systems and escalate privileges
– • Test Active Directory setups for weaknesses and misconfigurations
– • Perform Linux exploitation and gain elevated access rights
– • Use reverse engineering and fuzzing to find software flaws and develop exploits
– • Move through networks using pivoting methods to access deeper systems
– • Analyze IoT devices and uncover vulnerabilities in their firmware or protocols
– • Write and deliver professional reports with clear findings and security recommendations
No specific prerequisites are required for this course. Basic computer literacy and familiarity with fundamental concepts in the subject area are recommended for the best learning experience.
• Introduction to Penetration Testing and Methodologies
• Introduction to Penetration Testing and Methodologies
• Introduction to Penetration Testing and Methodologies
• Introduction to Penetration Testing and Methodologies
• Penetration Testing Scoping and Engagement
• Penetration Testing Scoping and Engagement
• Penetration Testing Scoping and Engagement
• Penetration Testing Scoping and Engagement
• Open-Source Intelligence (OSINT) and Attack
• Open-Source Intelligence (OSINT) and Attack
• Open-Source Intelligence (OSINT) and Attack
• Open-Source Intelligence (OSINT) and Attack
• Surface Mapping
• Surface Mapping
• Surface Mapping
• Surface Mapping
• Social Engineering Penetration Testing
• Social Engineering Penetration Testing
• Social Engineering Penetration Testing
• Social Engineering Penetration Testing
• Web Application Penetration Testing
• Web Application Penetration Testing
• Web Application Penetration Testing
• Web Application Penetration Testing
• API and Java Web Token Penetration Testing
• API and Java Web Token Penetration Testing
• API and Java Web Token Penetration Testing
• API and Java Web Token Penetration Testing
• Perimeter Defense Evasion Techniques
• Perimeter Defense Evasion Techniques
• Perimeter Defense Evasion Techniques
• Perimeter Defense Evasion Techniques
• Windows Exploitation and Privilege Escalation
• Windows Exploitation and Privilege Escalation
• Windows Exploitation and Privilege Escalation
• Windows Exploitation and Privilege Escalation
• Active Directory Penetration Testing
• Active Directory Penetration Testing
• Active Directory Penetration Testing
• Active Directory Penetration Testing
• Linux Exploitation and Privilege Escalation
• Linux Exploitation and Privilege Escalation
• Linux Exploitation and Privilege Escalation
• Linux Exploitation and Privilege Escalation
• Reverse Engineering, Fuzzing, and Binary Exploitation
• Reverse Engineering, Fuzzing, and Binary Exploitation
• Reverse Engineering, Fuzzing, and Binary Exploitation
• Reverse Engineering, Fuzzing, and Binary Exploitation
• Lateral Movement and Pivoting
• Lateral Movement and Pivoting
• Lateral Movement and Pivoting
• Lateral Movement and Pivoting
• IoT Penetration Testing
• IoT Penetration Testing
• IoT Penetration Testing
• IoT Penetration Testing
• Report Writing and Post-Testing Actions
• Report Writing and Post-Testing Actions
• Report Writing and Post-Testing Actions
• Report Writing and Post-Testing Actions
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.