Detaillierter Kursinhalt
- Module 01: Introduction to Penetration Testing
- Module 02: Penetration Testing Scoping and Engagement
- Module 03: Open Source Intelligence (OSINT)
- Module 04: Social Engineering Penetration Testing
- Module 05: Network Penetration Testing - External
- Module 06: Network Penetration Testing - Internal
- Module 07: Network Penetration Testing - Perimeter Devices
- Module 08: Web Application Penetration Testing
- Module 09: Wireless Penetration Testing
- Module 10: IoT Penetration Testing
- Module 11: OT/SCADA Penetration Testing
- Module 12: Cloud Penetration Testing
- Module 13: Binary Analysis and Exploitation
- Module 14: Report Writing and Post Testing Actions
- Appendix A: Penetration Testing Essential Concepts
- Appendix B: Fuzzing
- Appendix C: Mastering Metasploit Framework
- Appendix D: PowerShell Scripting
- Appendix E: Bash Environment and Scripting
- Appendix F: Python Environment and Scripting
- Appendix G: Perl Environment and Scripting
- Appendix H: Ruby Environment and Scripting
- Appendix I: Active Directory Pen Test
- Appendix J: Database Penetration Testing
- Appendix K: Mobile Device Penetration Testing