Základní info
  This course is ideal if you are an intermediate-level cyber security professional interested in safely consolidating and practicing your skills using ethical hacking tools, and advance the necessary techniques to fulfil security testing responsibilities. These roles include:
- Information Security Specialists
- Cyber Security Specialists
- (Cyber) Security Consultants
- Vulnerability Assessors
- Penetration Testers
- Ethical Hackers
- Red Team/Penetration Testing team members
Learning outcomes
- Demonstrate effective use of current tools and techniques used by industry-qualified cyber security penetration testers.
- Use tools, techniques, and procedures to remotely exploit and establish persistence on a target.
- Analyse tools and frameworks that are most readily available to hackers seeking to attack an organisation.
- Identify and analyse physical, functional or behavioural relationships to develop understanding of attackers and their objectives.
- Evaluate host-based security products and how those products reduce vulnerability to exploitation.
- Assess the robustness of security systems and designs.
- Prioritise the various risks associated with security testing.
- Carry out attack and defense operations for the purpose of exercises and vulnerability assessment and detection.
- Manage senior stakeholders.
- Create and present clear and concise technical documentation to technical and non-technical third parties.