Course Details
Topic 1 Planning and Scoping
- Planning a pen test
- Rules of engagement
- Regulatory compliance
- Resources and budgets
- Impact and constraints
- Support resources
- Legal groundwork
- Service provider agreements
- Standards and methodologies
- Environment and scoping considerations
- Ethical mindset
- Lab environment setup
- Project strategy and risk
- Scope vulnerabilities
- Compliance-based assessments
Topic 2 Information Gathering and Vulnerability Scanning
- Scanning and enumeration
- Scanning and demo
- Packet investigation
- Packet inspection demo
- Lab setup
- Lab: Wireshark
- Application and open-source resources
- Passive reconnaissance
- Active reconnaissance
- Vulnerability scanning
- Vulnerability scanning demo
- Lab: Network basis
- Lab: Nmap discovery
- Target considerations
- Analysing scan output
- Nmap scoping and output options
- Nmap timing and performance options
- Prioritization of vulnerabilities
- Common attack techniques
- Automating vulnerability scans
- Credential attacks
- Lab: Password cracking
- Lab: Secure Sockets Layer
- Lab: Routing basics
Topic 3 Attacks and Exploits
- Network-based attacks
- Wireless and RF Attacks
- Web and Database Attacks
- Attacking the cloud
- Specialised and Fragile Systems
- Social Engineering and Physical attacks
- Post-Exploitation
Topic 4 Reporting and Communication
- Report writing
- Important components of written reports
- Mitigation strategies
- Technical and physical controls
- Administrative and operational controls
- Communication
- Presentation of findings
- Post-report activities
- Data destruction process
Topic 5 Tools and Code Analysis
- Using scripting in pen testing
- Bash scripting basics
- Python scripts
- Tools inventory
- Pen testing toolbox
- Scanners and credential tools
- Code-tracking tools
- Wireless and web pen testing tools
- Remote access tools
- Analysers and mobile pen testing tools
Practice Exam
Course Info
Promotion Code
Your will get 10% discount voucher for 2nd course onwards if you write us a Google review.
Minimum Entry Requirement
Knowledge and Skills
- Able to operate using computer functions
- Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)
Attitude
- Positive Learning Attitude
- Enthusiastic Learner
Experience
- Minimum of 1 year of working experience.
Target Age Group: 18-65 years old
Minimum Software/Hardware Requirement
Software:
TBD
Hardware: Window or Mac Laptops
Job Roles
- Penetration Tester
- Ethical Hacker
- Cybersecurity Analyst
- Information Security Consultant
- Vulnerability Analyst
- Security Operations Center (SOC) Analyst
- Network Security Specialist
- IT Security Engineer
- Cybersecurity Auditor
- Compliance and Controls Analyst
- Incident Response Analyst
- Forensic Analyst
- Security Architect
- Risk Assessment Specialist
- Cyber Defense Analyst
- Application Security Engineer
- Cyber Threat Intelligence Analyst
- IT Auditor focusing on security
- Security Systems Administrator
- Information Assurance Technician
Trainers
Alec Tan: Alec Tan is a ACTA certified trainer, He has a number of Comptia certifications. Since 2002, starting off from IT technical background to pre-sales, sales account manager, system integration, operate IT retail / repair shop business in Sim Lim Square 2008 ~ 2012, and back to IT industry employment, freelance IT Trainer till present.
Peter Cheong : I am a ACLP certied trainer. Specialise In IT related knowlege and conduct IT Training which Include Microsoft Window Server Technology (Wintel) and Linux - Centos/Red Hat. Comptia ,ITIL , Motorola Solution Trunking System and Cisco Networking. I was worked in Motorola Solutions Conduct Motorola Astro 25 Trunking System For Police Force Malaysia (RMPnet),Taiwan Navy, Indonesia METRO POLDA (Police Force). After that I Join As IT Group Manager For W-Group which include 17 subsidiaries Companies in Real Estate Developer,Plantation, Building Management Services ,Contruction and also Fiber Opti Service Provider in Sabah,Malaysia.
Customer Reviews (2)
- will recommend Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - will recommend Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment