What Skills Will You Learn?

HARDWARE PLANNING & SCOPING

Explain the importance of planning and key aspects of compliance-based assessments

WINDOWS ‚ÄčOPERATING SYSTEMS INFORMATION GATHERING & VULNERABILITY IDENTIFICATION
Gather information to prepare for exploitation then perform a vulnerability scan and analyze results.

SOFTWARE TROUBLESHOOTING ATTACKS & EXPLOITS

Exploit network, wireless, application, and RF-based vulnerabilities, summarize physical security attacks, and perform post-exploitation techniques

NETWORKING PENETRATION TESTING TOOLS

Conduct information gathering exercises with various tools and analyze output and basic scripts (limited to: Bash, Python, Ruby, PowerShell)

HARDWARE & NETWORK TROUBLESHOOTING REPORTING & COMMUNICATION

Utilize report writing and handling best practices explaining recommended mitigation strategies for discovered vulnerabilities