We are happy to advise you!
    
        Contact
 
                                    
    
    
                             
            
         
     
    
    
        
    
            
            
        
            
     
        
            
            
            
    
    
    
        
    
    
                
        
    
    
    
    
        
            
            
            
        
                    
        
    
             
    
            
            Professional Penetration Tester (G-PPT) – Outline
            
            
    
            
            
                
                                    
                                                
                            Detailed Course Outline
                        
                        
- Introduction and methodology G | PPT
- Enumeration, recognition and OSINT (Open-Source Intelligence)
- Port scanning and traffic analysis
- Vulnerability analysis
- Elevation of privileges and password attacks
- Metasploit and Post-Exploitation
- Client Side Attacks
- Active Directory & Fileless Attack operation
- Side attacks and pivoting
- Malware and Botnet
- Attacks on web applications
- Bypass Firewall & IDS / IPS
- Attacks on wireless networks
- Buffer Overflow exploitation
- Security audit report