This course will cover the full life cycle of penetration testing ranging from passive and active reconnaissance, vulnerability assessment, and exploitation via various methods, post-exploitation and pivoting, reporting writing and post incident forensics.
Penetration testing is the process of simulating a malicious attack on a system or network to identify vulnerabilities and weaknesses. Forensics is the process of collecting, analyzing, and presenting evidence from a system or network after an incident or breach.
Requirements
- SOC Analyst knowledge
- TCP/IP and its underlying protocols including
- Routing and other basic networking knowledge (DNS, ICMP, etc)
- HTTP Protocol including verbs, status codes and parameter
- Basics of computers and networking
Features
- Automate Every Step of Your Penetration Test
- Put Your People to the Test
- Test with Success, Regardless of Experience
- Gather and Reuse Credentials
Target audiences
- IT professionals
- Security Engineers
- IA Technicians
- Security Consultants
- Network Administrators
- Any person with knowledge in SOC Analyst