Základní info
IT professionals who wish to understand ethical hacking techniques and begin adding security/penetration testing to their skillset in order to fulfil security testing responsibilities. Examples might include:
- Systems Administrators
- Information Security Specialists
- Vulnerability Assessors
- Penetration Testers
- Security Assessors
- Junior Red Team /Penetration Testing team members
Learning outcomes
- Demonstrate use of current techniques used by industry qualified cyber-security penetration testers.
- Determine and highlight various risks associated with security testing.
- Interpret vulnerability scan results to identify vulnerabilities and their levels of criticality in relation to an organisation.
- Conduct application vulnerability assessments and understanding their results.
- Remotely exploit and establish persistence on a target.
- Present clear and concise technical documentation to technical and non-technical third parties.