Detailed Course Outline
- Introduction to Vulnerability Assessment and
- Penetration Testing
- Information Gathering Methodology
- Scanning and Enumeration
- Identify Vulnerabilities
- Exploitation
- Post Exploitation
- Advanced Tips and Techniques
- Preparing a Report
- Practice Ranges