In this intensive hands-on course, you will learn how to detect, assess, and exploit numerous CyberSecurity vulnerabilities that stem from improper software configuration, software inconsistencies, and design flaws within an overall network infrastructure and applications. You will also examine useful methods for uncovering wired and wireless network backdoors. Working through a series of hands-on exercises, you will discover the most common CyberSecurity mistakes made by vendors, administrators, and users, and master proven tactics for thwarting them.
You will discover methods for locating and confirming frequently exploited Web and other TCP/IP application vulnerabilities. You will get proven tips on building a powerful CyberSecurity testing tool kit using both freeware and commercial tool alternatives that will let you test for frequently exploited TCP/IP network and computing platform-specific security vulnerabilities. In addition, you will review a detailed analysis of features, platform applicability, and operational considerations associated with a wide array of CyberSecurity security testing tools for use on both Windows and Unix workstations.
- Identify the key incremental phases and deliverables in vulnerability and penetration testing
- Understand the importance of clear definition and communication of the “Rules of Engagement” for all parties involved
- Assess the risks, strengths, and weaknesses in different categories of testing tools
- Learn how to develop and use advanced CyberAudit software techniques to increase audit coverage
Questions? Contact us
Phone: +1 (781) 784-4390
Fax: +1 (781) 253-2066
Email: fill out form below