This course differs from other penetration testing and ethical hacking courses in several important ways
This course differs from other penetration testing and ethical hacking courses in several important ways:
It offers in-depth technical excellence along with industry-leading methodologies to conduct high-value penetration tests.
We get deep into the tools arsenal with numerous hands-on exercises that show subtle, less well-known and undocumented features that are useful for professional penetration testers and ethical hackers.
It discusses how the tools interrelate with each other in an overall testing process. Rather than just throwing up a bunch of tools and playing with them, we analyze how to leverage information from one tool to get the most bang out of the next tool.
We focus on the workflow of professional penetration testers and ethical hackers, proceeding step by step and discussing the most effective means for conducting projects.
The sessions address common pitfalls that arise in penetration tests and ethical hacking projects, providing real-world strategies and tactics for avoiding these problems to maximize the quality of test results.
We cover several time-saving tactics based on years of in-the-trenches experience of real penetration testers and ethical hacker – tasks that might take hours or days unless you know the little secrets we will cover that will let you surmount a problem in minutes.
The course stresses the mindset of successful penetration testers and ethical hackers, which involves balancing the often contravening forces of thinking outside the box, methodically trouble-shooting, carefully weighing risks, following a time-tested process, painstakingly documenting results and creating a high-quality final report that achieves management and technical buy-in.
We analyze how penetration testing and ethical hacking should fit into a comprehensive enterprise information security program.
Attendees are expected to have a working knowledge of TCP/IP, understand the differences between cryptographic routines such as DES, AES, and MD5, and have a basic knowledge of the Windows and Linux command lines before they step into class. While 560 is technically in-depth, it is important to note that programming knowledge is NOT required for the course.
Certifications must be renewed every 4 years