Training programs can be designed at the request of the customer. The standard duration of all trainings is 5 days. However, if the customer wants to learn more about some details, the duration of that part can be increased. In addition, more comprehensive training programs can be designed by increasing the number of applications. All our training is hands-on. Only theoretical trainings are not provided by AZETECH.
- Pentest definition, purpose, considerations
- External network scans and active information gathering
- Discovery and vulnerability scans
- vulnerability exploitation
- Domain and end-user computers penetration testing
- What to do after abuse (post-exploitation)
- Database penetration tests
- Network components penetration tests and second layer attacks
- Methods of circumventing security mechanisms
- Social engineering
- Web applications penetration testing