This Master Course is for those who want to become penetration testers or improve their mastery of penetration-testing tools.
Mossé Cyber Security Institute will teach you how to master the most important penetration-testing tools available. Detailed step-by-step instructions are provided for students to learn how to use Metasploit, NMAP, OpenVAS, PowerShell Empire, PoshC2, PowerSploit, Bloodhood and Burp Suite.
Among the many topics covered are:
Theoretical knowledge makes up 40% of the course, and 60% is made up of practical exercises. The last day of the course is a practical penetration-testing exercise where students will put the skills they have learnt into practice.Course Outcome
You will learn or refine techniques, tactics and procedures to become a highly proficient penetration tester capable of delivering professional engagements against a variety of targets.
The content taught in this course has been extensively tested against hundreds of computer networks and applications and proved highly effective against targets with a low or moderate defence. In other words, unless your target has an endpoint detection and response (EDR) product deployed across their network, a secure standard operating environment (SSOE), and a professional team of security analysts detecting and responding to breaches, your chances of hacking them, completely, will be high!
If you work on the defensive side of security, this course will teach you many of the most common techniques and tools used by penetration testers and offer you tactics and strategies on how you may protect your network against those techniques.Intended Audience
We begin the course by teaching you structured methodologies to deliver penetration testing engagements based on the OWASP Testing Guide, the Penetration Testing Execution Standard (PTES), the PCI Penetration Testing Guide, and the Information Systems Security Assessment Framework (ISSAF).
We will clarify the different types of penetration tests that exist (web application, web services, mobile application, network infrastructure, wireless infrastructure, and other types), and provide practical advice on how one may go about designing, proposing, and obtaining authorization to test and compromise critical IT assets.Some other important points covered in this module include:
They are hundreds, if not thousands, of free penetration testing tools available online. Mossé Security will also clarify why it selected the tools that it did for this Master Course.Module 2: Metasploit Masterclass
|No open registration programmes scheduled. Contact us to run this learning programme onsite.|