Book Online Tickets for Cyber Security Boot Camp for Penetration, Pune. ATTENTION!!! All Engineers, IT Professionals & Non-IT People Who Would Like To Make A Career In Cyber Security. This Is Your Chance To Enter In The World’s Most In-Demand Field. Apply Now!!!
 
> 7 Hours Penetration Testing Training

Cyber Security Boot Camp for Penetration Testing

 

Invite friends

Contact Us

Page Views : 35

About The Event

ATTENTION!!! All Engineers, IT Professionals & Non-IT People Who Would Like To Make A Career In Cyber Security. This Is Your Chance To Enter In The World’s Most In-Demand Field. Apply Now!!!

 

> 7 Hours Penetration Testing Training with

 

> Corporate Lunch,

 

> High-Tea,

 

> Pen-drive with licensed cyber-security tools,

 

> Complimentary access to E-learning modules,

 

> Certificate from CompTIA (USA Based vendor-neutral body),

 

> Gift vouchers every hour and

 

> A chance to have an enticing career in Cyber Security globally.  

 

What skills will you learn?

 

  1. Planning and Scoping

 

Explain the importance of
planning and key aspects of
compliance-based assessment

 

  1. Information Gathering &
    Vulnerability Identification

 

Gather information to prepare for
exploitation then perform a
vulnerability scan and analyze results

 

  1. Attacks & Exploits

 

Exploit network, wireless application,
and RF-based vulnerabilities,
summarize physical security attacks, and perform post-exploitation techniques

 

  1. Reporting & Communication

 

Utilize report writing and handling
best practices explaining
recommended mitigation strategies
for discovered vulnerabilities

 

  1. Penetration Testing Tools

 

Conduct information gathering
exercises with various tools and
analyze output and basic scripts
(limited to Bash, Python,
Ruby, PowerShell)

 

  1. Technologies & Tools

 

Install, configure, and deploy
network components while
assessing and troubleshooting
issues to support
organizational security

 

  1. Threats, Attacks & Vulnerabilities

 

Detect various types of compromise
and have an understanding of
penetration testing and vulnerability
scanning concepts

 

  1. Architecture & Design

 

Implement secure network
architecture concepts and
systems design

 

  1. Risk Management

 

Implement and summarize risk
management best practices
and business impact

  10. Cryptography & PKI

 

Install and configure wireless
security settings and implement
public key infrastructure

  11. Identity & Access Management

 

Install and configure identity and
access services, as
well as management controls

 

The speakers of the event are the actual Cyber-Security practitioners consulting to IT giants like Infosys, TechMahindra, Wipro, TCS etc.  with 15+ years’ experience.

 

More Events From Same Organizer

Similar Category Events