Professional Penetration Tester (G-PPT) – Outline

Detailed Course Outline

  • Introduction and methodology G | PPT
  • Enumeration, recognition and OSINT (Open-Source Intelligence)
  • Port scanning and traffic analysis
  • Vulnerability analysis
  • Elevation of privileges and password attacks
  • Metasploit and Post-Exploitation
  • Client Side Attacks
  • Active Directory & Fileless Attack operation
  • Side attacks and pivoting
  • Malware and Botnet
  • Attacks on web applications
  • Bypass Firewall & IDS / IPS
  • Attacks on wireless networks
  • Buffer Overflow exploitation
  • Security audit report