Who Should Attend Pen Testing Training?

Network server administrators, Firewall Administrators, Information Security Testers, System Administrators and Risk Assessment professionals.

During this Advanced Ethical Hacking course you’ll learn:

01. The Need for Security Analysis

02. Advanced Googling

03. TCP/IP Packet Analysis

04. Advanced Sniffing Techniques

05. Vulnerability Analysis with Nessus

06. Advanced Wireless Testing

07. Designing a DMZ

08. Snort Analysis

09. Log Analysis

10. Advanced Exploits and Tools

11. Pen Testing Methodologies

12. Customers and Legal Agreements

13. Rules of Engagement

14. Penetration Testing Planning and Scheduling

15. Pre Penetration Testing Checklist

16. Information Gathering

17. Vulnerability Analysis

18. External Penetration Testing

19. Internal Network Penetration Testing

20. Routers and Switches Penetration Testing

21. Firewall Penetration Testing

22. IDS Penetration Testing

23. Wireless Network Penetration Testing

24. Denial of Service Penetration Testing

25. Password Cracking Penetration Testing

26. Social Engineering Penetration Testing

27. Stolen Laptop, PDAs and Cell Phones Penetration Testing

28. Application Penetration Testing

29. Physical Security Penetration Testing

30. Database Penetration testing

31. VoIP Penetration Testing

32. VPN Penetration Testing

33. War Dialing

34. Virus and Trojan Detection

35. Log Management Penetration Testing

36. File Integrity Checking

37. Blue Tooth and Hand held Device Penetration Testing

38. Telecommunication and Broadband Communication Penetration Testing

39. Email Security Penetration Testing

40. Security Patches Penetration Testing

41. Data Leakage Penetration Testing

42. Penetration Testing Deliverables and Conclusion

43. Penetration Testing Report and Documentation Writing

44.Penetration Testing Report Analysis

45. Post Testing Actions

46. Ethics of a Licensed Penetration Tester

47. Standards and Compliance

Why get this Advanced Ethical Hacking / Penetration Tester Certification?

Computers around the world are systematically being victimized by rampant hacking. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes.

What is the next step in Computer Security?

The Licensed Penetration Tester (LPT); Network Penetration Testing

EC Council the world leader in ethical hacking training brings you Licensed Penetration Tester License. The Certified Ethical Hacker & Certified Security Analyst certifications are the base qualifications for a candidate to apply for the Licensed Penetration Tester, LPT.