K Labs mette a tua disposizione i propri Trainers Certificati, i Laboratori Didattici, i Simulatori di Esame, il proprio Test Center e un Tutor a te dedicato per la preparazione all'esame.
Grazie al nostro supporto la percentuale di candidati che ottengono la certificazione al primo tentativo è prossima al 100%.
OBJECTIVES This training introduces the penetration testing tools and techniques via hands-on experience. In this training the trainee has the chance to build its own penetration techniques to secure its own network.
PREREQUISITES Solid understanding of TCP/IP networking Reasonable understanding of Linux.
WHO SHOULD ATTEND This course is designed for information security professionals who want to take a serious and meaningful step into the world of professional penetration testing. This includes: Pentesters Security professionals Network administrators Other technology professionals
TOPICS Passive Information Gathering Active Information Gathering Vulnerability Scanning Buffer Overflows Win32 Buffer Overflow Exploitation Linux Buffer Overflow Exploitation Working with Exploits File Transfers Privilege Escalation Client Side Attacks Web Application Attacks Password Attacks Port Redirection and Tunneling The Metasploit Framework Bypassing Antivirus Software Assembling the Pieces: Penetration Test Breakdown