Penetration Vulnerabilities Uncovered
1 session, 3 hours of interactive training
The Penetration Vulnerabilities training course is the 2nd step in the CPTEngineer series which is based on 5 key elements of Pen Testing; information, gathering, scanning, enumeration, exploration and reporting. In this course expert Duane Anderson will help you understand the techniques necessary to effectively asses your system and network vulnerabilities. In this course you will learn the different tools used to asses system vulnerability and you will learn how and when to use them in the work place. This course is part two of five training series that will help prepare you to pass the CPTEngineer Certification Exam, formerly known as CPTS.
Learn effective malware countermeasures
Identify and resolve network hardware vulnerabilities
Implement effective tools for tracking security alerts
View Complete Course Index (PDF)
CD Product Code: 151018
Online Product Code: 151011
|Single User Price:
Contact a Shadowbox Learning Service Sales Representative for Multi User pricing options.
Do you have older software for which you need training? Contact us and we may have just what your looking for!