Penetration Testing Methodology provides students with a comprehensive and hands-on exposure to the processes, tools and procedures used by penetration testers. Students experience concepts and methods involved in targeting, infiltrating and expanding access within networks. The course develops student insight into the attacker mindset and simulates a real-world attacker’s thoughts and actions. Such insights are for the purpose improving the security posture of the organizations supported by the student.
Penetration Testing Methodology includes significant amounts of hands-on practical application of skills learned. Students are introduced to topics and concepts through lectures then given a series of lab exercises to reinforce that learning and build skill. Students must exercise the penetration testing methodology, process and analyze collected data, and develop the necessary trade-craft and stealth to successfully complete the goals of the course.
Upon successful completion of this course, students will be able to:
Security professionals wanting to expand into assessing their own network and systems to find security vulnerabilities.
Students attending the course should have a strong understanding of how data traverses a network, basic UNIX and Windows competency, and comfort working from the command line.