Description
Course outline:- Module 00 Student Introduction Module 01 The Need for Security Analysis Module 02 Advanced Googling Module 03 TCP/IP Packet Analysis Module 04 Advanced Sniffing Module 05 Vulnerability Analysis Module 06 Advanced Wireless Module 07 Designing a DMZ Module 08 Snort Analysis Module 09 Log Analysis Module 10 Advanced Exploits and Tools Module 11 Penetration Testing Methodologies Module 12 Customers and Legal Agreements Module 13 Rules of Engagement Module 14 Penetration Testing Planning and Scheduling Module 15 Customers and Legal Agreements Module 16 Information Gathering Module 17 Vulnerability Analysis Module 18 External Penetration Testing Module 19 Internal Network Penetration Testing Module 20 Router and Switches Penetration Testing Module 21 Firewall Penetration Testing Module 22 IDS Penetration Testing Module 23 Wireless Network Penetration Testing Module 24 Denial of Service Penetration Testing Module 25 Password Cracking Penetration Testing Module 26 Social Engineering Penetration Testing Module 27 Stolen Laptops, PDAs, and Cell Phones Penetration Testing Module 28 Application Penetration Testing Module 29 Physical Security Penetration Testing Module 30 Database Penetration Testing Module 31 VoIP Penetration Testing Module 32 VPN Penetration Testing Module 33 War Dialing Module 34 Virus and Trojan Detection Module 35 Log Management Penetration Testing Module 36 File Integrity Checking Module 37 Bluetooth and Hand Held Device Penetration Testing Module 38 Telecommunication and Broadband Communication Penetration Testing Module 39 Email Security Penetration Testing Mod





Reviews
There are no reviews yet.