- Overview of Vulnerability Assessment & Penetration Testing
Â
- Why Penetration Testing is required?
- Offensive & Defensive face of Penetration Testing
- Preparation for Penetration Testing Live test-case
- Identify weaknesses using Vulnerability Assessment tools
Â
- Data Leakage Threats and Mitigation
Â
- Identify data leakage entry points
- External| Internal data leakages
- Searching of Corporate Data Leakages
- Searching of Employee Data Leakages
- How attacker can exploit Corporate | Employee Data
- Security Testing Policy | Guidelines for Data Leakage
Â
- Penetration Testing Methodology
Â
- OSINT Penetration Testing Methodology
- OWASP Penetration Testing Methodology
- NIST Security Testing & Standards
- Penetration Testing Plan Template
- Security Assessment Plan Template
- Security Testing Plan Template
- Security White Paper & Research Paper
Â
- Vulnerability Analysis
Â
- Vulnerability Analysis using various tools
- Check Vulnerability status & Alerts
- Testing Exploit on Vulnerabilities
- Check false Vulnerabilities & exploits
- Find Patches & Hotfix with CVEs
- Preparing reports
- Exploit & CVE Expose Tools
Â
- Why Hackers Need Vulnerability Research
- Vulnerability Research Tools
- Vulnerability Research Websites
- Research Powerful Exploit tools
- Research Private exploits
Â
- Network Scanning & Auxiliary Scanners
Â
- Discover Network Connected Device & Servers
- Local area network Services Scanning
- Nmap Network & Service enumerations
- NetCat (Service Enumerations)
- NSE Scripts for vulnerability Analysis
- Different Port Scanning Techniques
- Firewall / IDS evasion Technique
- Discover & Exploit services using Auxiliary
Â
- Penetration Testing Reporting
Â
- Collect Penetration Testing Scan Results
- Open Source reporting framework
Â
- Infrastructure Security Maintenance checklists
Â
- Data Loss Prevention Checklist
- All Server Hardening Checklists
- Complete Network Security Checklist
- Security Assessment Checklist
- Security Audit Checklist
Start today and get certified from
Industrial Experts
Partners
Free
The course is external
Instructor
Zybeak Technologies
Level
Intermediate
Duration
40 hours
Enrolled
0 Students