Description
Who should attend
- IT professionals looking to enhance their technical skills and knowledge
- Auditors looking to understand the Penetration Testing processes
- IT and Risk managers seeking a more detailed understanding of the appropriate and beneficial use of Penetration Tests
- Incident handlers and Business Continuity professionals looking to use testing as part of their testing regimes
- Penetration testers
- Ethical hackers
- Cybersecurity professionals
Learning objectives
- Learn how to interpret and illustrate the main Penetration Testing concepts and principles
- Understand the core technical knowledge needed to organize and carry out an effective set of Pen Tests
- Learn how to effectively plan a Penetration Test and identify a scope which is suitable and appropriate based on risk
- Acquire hands-on practical skills and knowledge on relevant tools and techniques used to efficiently conduct a Penetration Testing
- Learn how to effectively manage the time and resources needed to scale a specific Penetration Test
Educational approach
- This training is based on both theory and best practices used in Pen Testing
- Lecture sessions are illustrated with examples based on case studies
- Practical exercises are based on a case study which includes role playing and discussions
- Practical tests are similar to the Certification Exam
Prerequisites
A fundamental understanding of Penetration Testing and comprehensive knowledge of Cybersecurity.