Penetration Test

Share on facebook
Share on google
Share on twitter
Share on linkedin

Main Topics

  • Definition of pentest, purpose, issues to be considered
  • External network scans and active information gathering
  • Discovery and vulnerability scanning
  • Exploitation
  • Domain and end user computers penetration tests
  • Things to do after abuse (post-exploitation)
  • Database penetration tests
  • Network components penetration tests and second layer attacks
  • Security mechanisms circumvention methods – Social engineering
  • Web applications penetration tests


  • Basic network knowledge
  • Operating systems knowledge (Windows and Unix)
  • Getting to know border security structures
  • Domain information

Duration: 5 days