Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Core modules:
- Need for Security Analysis
- TCP IP Packet Analysis
- Penetration Testing Methodologies
- Customers and legal Agreements
- Rules of Engagement
- Penetration Testing Planning and Scheduling
- Pre- Penetration Testing Steps
- Information gathering
- Vulnerability Analysis
- External penetration Testing
- Internal Network Pen Testing
- Firewall Penetration Testing
- IDS Penetration Testing
- Password Cracking Penetration Testing
- Social Engineering Penetration testing
- Web Application Penetration Testing
- SQL Penetration Testing
- Penetration Testing Reports and Post Testing Actions
Additional Modules:
- Router and Switches Penetration Testing
- Wireless Network Penetration Testing
- Denial-of-Service Penetration Testing
- Stolen Laptop, PDAs and Cell Phones Penetration Testing
- Source Code Penetration Testing
- Physical Security Penetration Testing
- Surveillance Camera Penetration Testing
- Database Penetration Testing
- VoIP Penetration Testing
- VPN Penetration Testing
- Cloud Penetration Testing
- Virtual Machine Penetration Testing
- War Dialling
- Virus and Trojan Detection
- Log Management Penetration Testing
- File Integrity Checking
- Mobile Devices Penetration Testing
- Telecommunication and Broadband Communication Penetration Testing
- Email Security Penetration Testing
- Security Patches Penetration Testing
- Data Leakage Penetration Testing
- SAP Penetration Testing
- Standards and Compliance
- Information System Security Principles
- Information System Incident and Response
- Information System Auditing and Certification
Requirements
No Prerequisites required
35 Hours
Testimonials (1)
Questions, that helps me a lot to understand the characteristics of CRISC examination.