We are happy to advise you!
    
        Contact
 
                                    
    
    
                             
            
         
     
    
    
        
    
            
            
        
            
     
        
            
            
            
    
    
    
        
    
    
                
        
    
    
    
    
        
            
            
            
        
                    
        
    
             
    
            
            Professional Penetration Tester (G-PPT) – Outline
            
            
    
            
            
                
                                    
                                                
                            Detailed Course Outline
                        
                        
- Introduction and methodology G | PPT
 - Enumeration, recognition and OSINT (Open-Source Intelligence)
 - Port scanning and traffic analysis
 - Vulnerability analysis
 - Elevation of privileges and password attacks
 - Metasploit and Post-Exploitation
 - Client Side Attacks
 - Active Directory & Fileless Attack operation
 - Side attacks and pivoting
 - Malware and Botnet
 - Attacks on web applications
 - Bypass Firewall & IDS / IPS
 - Attacks on wireless networks
 - Buffer Overflow exploitation
 - Security audit report