Course details

Course Outline

Module 01: Need for Security Analysis

Module 02: TCP/IP Packet Analysis

Module 03: Penetration Testing Methodologies

Module 04: Customers and Legal Agreements

Module 05: Rules of Engagement

Module 06: Penetration Testing Planning and Scheduling

Module 07: Pre-penetration Testing Steps

Module 08: Information Gathering

Module 09: Vulnerability Analysis

Module 10: External Penetration Testing

Module 11: Internal Network Penetration Testing

Module 12: Firewall Penetration Testing

Module 13: IDS Penetration Testing

Module 14: Password Cracking Penetration Testing

Module 15: Social Engineering Penetration Testing

Module 16: Web Application Penetration Testing

Module 17: SQL Penetration Testing

Module 18: Penetration Testing Reports and Post Testing Actions

Self-study Modules

Module 19: Router and Switches Penetration Testing

Module 20: Wireless Network Penetration Testing

Module 21: Denial-of-Service Penetration Testing

Module 22: Stolen Laptop, PDAs, and Cell Phones Penetration Testing

Module 23: Source Code Penetration Testing

Module 24: Physical Security Penetration Testing

Module 25: Surveillance Camera Penetration Testing

Module 26: Database Penetration Testing

Module 27: VoIP Penetration Testing

Module 28: VPN Penetration Testing

Module 29: Cloud Penetration Testing

Module 30: Virtual Machine Penetration Testing

Module 31: War Dialing

Module 32: Virus and Trojan Detection

Module 33: Log Management Penetration Testing 

Module 34: File Integrity Checking

Module 35: Mobile Devices Penetration Testing

Module 36: Telecommunication and Broadband Communication Penetration Testing

Module 37: Email Security Penetration Testing

Module 38: Security Patches Penetration Testing

Module 39: Data Leakage Penetration Testing

Module 40: SAP Penetration Testing

Module 41: Standards and Compliance

Module 42: Information System Security Principles

Module 43: Information System Incident Handling and Response

Module 44: Information System Auditing and Certification

Updated on 08 November, 2015

About New Horizons Singapore

Whether the training is for one individual or several hundred employees in multiple locations across the globe, New Horizons has a training program to fit any company or any individual need. We deliver a full range of technical, application and business skills training solutions. Our training ranges from basic application and desktop productivity tools (i.e., Project, Excel, PowerPoint) to complex and integrated business systems (i.e., information security, ITIL, Microsoft, Cisco and Novell). New Horizons offers classroom, mentored and distance learning options for virtually every desktop application used in the world of business

See all New Horizons Singapore courses
Are you from New Horizons Singapore ? Claim your course!
Courses you can instantly connect with... Do an online course on Networking and Security starting now. See all courses

Is this the right course for you?

Rate this page

Didn't find what you were looking for ?

or