K Labs goes along with you providing you with its Certified Trainers, Training Laboratories, Exam Simulators, the Test Center and a dedicated Tutor that helps you to prepare for the exam.
Thanks to our support, the percentage of candidates who obtain the certification at the first attempt is very close to 100%.
OBJECTIVES This training introduces the penetration testing tools and techniques via hands-on experience. In this training the trainee has the chance to build its own penetration techniques to secure its own network.
PREREQUISITES Solid understanding of TCP/IP networking Reasonable understanding of Linux.
WHO SHOULD ATTEND This course is designed for information security professionals who want to take a serious and meaningful step into the world of professional penetration testing. This includes: Pentesters Security professionals Network administrators Other technology professionals
TOPICS Passive Information Gathering Active Information Gathering Vulnerability Scanning Buffer Overflows Win32 Buffer Overflow Exploitation Linux Buffer Overflow Exploitation Working with Exploits File Transfers Privilege Escalation Client Side Attacks Web Application Attacks Password Attacks Port Redirection and Tunneling The Metasploit Framework Bypassing Antivirus Software Assembling the Pieces: Penetration Test Breakdown