IT-kurs
Sikkerhetskurs for IT
Sikkerhetstesting
Du har valgt: Oslo
Nullstill
Filter
Ferdig

-

1 treff ( i Oslo ) i Sikkerhetstesting
 

Oslo 5 dager 30 000 kr
27 Nov
The ECSA penetration testing certification is a security credential like no other! [+]
The ECSA penetration testing course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report. The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology: Focuses on pentesting methodology with an emphasis on hands-on learning The exam will now have a prerequisite of submitting a pentesting report The goal of these changes is to make passing ECSA more difficult; therefore making it a more respected certification Instruktør på Security Analyst kurset er Robert PetrunicRobert Petrunic jobber i Infigo IS som senior sikkerhetskonsulent, for det meste på penetrasjonstesting og sikkerhetsrelatert rådgivning. Robert er Microsoft, ECCouncil og VMware sertifisert instruktør, og jobber med Kroatias største utdanningsinstitusjon Algebra som freelance instruktør.Robert er MVP (Microsoft Most Valuable Professional) på Enterprise Security. Han har hatt denne MVP tittelen siden 2008. I tillegg til Security har han sin ekspertise innen System Center Cloud og Datacenter Management samt Windows Azure   Course Outline Security Analysis and Penetration Testing Methodologies TCP IP Packet Analysis Pre-penetration Testing Steps Information Gathering Methodology Vulnerability Analysis External Network Penetration Testing Methodology Internal Network Penetration Testing Methodology Firewall Penetration Testing Methodology IDS Penetration Testing Methodology Web Application Penetration Testing Methodology SQL Penetration Testing Methodology Database Penetration Testing Methodology Wireless Network Penetration Testing Methodology Mobile Devices Penetration Testing Methodology Cloud Penetration Testing Methodology Report Writing and Post Test Actions [-]
Les mer

Lukk Denne siden benytter seg av informasjonskapsler (cookies).
Du kan fortsette å bruke siden som vanlig hvis du godtar dette. Les mer om bruk av informasjonskapsler i vår personvernerklæring.
;