Price:
$3,495.00
Days:
1
Virtual
– • You will understand advanced Windows Attacks.
– • You will access Hidden Networks with Pivoting.
– • You will be able to locate Attacking IOT Systems.
– • You will gain access to hidden networks using double pivoting.
– • You will understand the latest methods of privilege escalation and reverse engineering code to take control of execution, then break out of the limited shell required to gain root/admin access.
– • You will be able to test against different defenses you are likely to see in the wild.
– • You will be able to compromise and extract the required data from web applications to achieve objectives.
– • You will be prepared for advanced penetration testing techniques and scripting.
– • You will be able to build your armory with your coding expertise to tackle challenges.
No specific prerequisites are required for this course. Basic computer literacy and familiarity with fundamental concepts in the subject area are recommended for the best learning experience.
• Social Engineering Penetration Testing
• Social Engineering Penetration Testing
• Social Engineering Penetration Testing
• Social Engineering Penetration Testing
• Open Source Intelligence (OSINT)
• Open Source Intelligence (OSINT)
• Open Source Intelligence (OSINT)
• Open Source Intelligence (OSINT)
• Penetration Testing Scoping and Engagement
• Penetration Testing Scoping and Engagement
• Penetration Testing Scoping and Engagement
• Penetration Testing Scoping and Engagement
• Introduction to Penetration Testing
• Introduction to Penetration Testing
• Introduction to Penetration Testing
• Introduction to Penetration Testing
• Network Penetration Testing – Internal
• Network Penetration Testing – Internal
• Network Penetration Testing – Internal
• Network Penetration Testing – Internal
• Network Penetration Testing – External
• Network Penetration Testing – External
• Network Penetration Testing – External
• Network Penetration Testing – External
• Web Application Penetration Testing
• Web Application Penetration Testing
• Web Application Penetration Testing
• Web Application Penetration Testing
• Network Penetration Testing – Perimeter Devices
• Network Penetration Testing – Perimeter Devices
• Network Penetration Testing – Perimeter Devices
• Network Penetration Testing – Perimeter Devices
• Wireless Penetration Testing
• Wireless Penetration Testing
• Wireless Penetration Testing
• Wireless Penetration Testing
• Cloud Penetration Testing
• Cloud Penetration Testing
• Cloud Penetration Testing
• Cloud Penetration Testing
• Binary Analysis and Exploitation
• Binary Analysis and Exploitation
• Binary Analysis and Exploitation
• Binary Analysis and Exploitation
• IoT Penetration Testing
• IoT Penetration Testing
• IoT Penetration Testing
• IoT Penetration Testing
• OT/SCADA Penetration Testing
• OT/SCADA Penetration Testing
• OT/SCADA Penetration Testing
• OT/SCADA Penetration Testing
• Report Writing and Post Testing Actions
• Report Writing and Post Testing Actions
• Report Writing and Post Testing Actions
• Report Writing and Post Testing Actions
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.
Give your organization the skills edge it needs. Our corporate training experts will work with you to design, deliver, and support a customized IT program that drives real business results.