• Classroom
  • Online, Instructor-Led
Course Description

"To ensure your success in this course, you should have: Intermediate knowledge of information security concepts, including but not limited to identity and access management (IAM), cryptographic concepts and implementations, computer networking concepts and implementations, and common security technologies. Practical experience in securing various computing environments, including small to medium businesses, as well as enterprise environments.

Learning Objectives

After completing this course, you will be able to plan, conduct, analyze, and report on penetration tests, including the ability to… Plan and scope penetration tests Conduct passive reconnaissance Perform non-technical tests to gather information Conductive active reconnaissance Analyze vulnerabilities Penetrate networks Exploit host-based vulnerabilities Test applications Complete post-exploit tasks Analyze and report pen test results

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.