Professional Penetration Tester (G-PPT) – Perfil
            
            
    
            
            
                
                                    
                                                
                            Esquema Detallado del Curso
                        
                        
- Introduction and methodology G | PPT
- Enumeration, recognition and OSINT (Open-Source Intelligence)
- Port scanning and traffic analysis
- Vulnerability analysis
- Elevation of privileges and password attacks
- Metasploit and Post-Exploitation
- Client Side Attacks
- Active Directory & Fileless Attack operation
- Side attacks and pivoting
- Malware and Botnet
- Attacks on web applications
- Bypass Firewall & IDS / IPS
- Attacks on wireless networks
- Buffer Overflow exploitation
- Security audit report