We are happy to advise you!
Contact
Professional Penetration Tester (G-PPT) – Outline
Detailed Course Outline
- Introduction and methodology G | PPT
- Enumeration, recognition and OSINT (Open-Source Intelligence)
- Port scanning and traffic analysis
- Vulnerability analysis
- Elevation of privileges and password attacks
- Metasploit and Post-Exploitation
- Client Side Attacks
- Active Directory & Fileless Attack operation
- Side attacks and pivoting
- Malware and Botnet
- Attacks on web applications
- Bypass Firewall & IDS / IPS
- Attacks on wireless networks
- Buffer Overflow exploitation
- Security audit report