Course Overview
Learning Objectives
- Penetration testing processes and methodologies
- Information gathering & reconnaissance techniques
- Attacking Windows & Linux targets
- Active Directory penetration testing
- Web application penetration testing
- Manual & automated exploitation
- Vulnerability assessment
- Pivoting & Lateral Movement
- Post-exploitation enumeration
- Windows & Linux Privilege escalation
- Vulnerability/Risk communication and reporting
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):