Termine:
Derzeit haben wir keine offenen Kurstermine in nächster Zeit geplant. Gerne organisieren wir ab 3 Teilnehmer einen offiziellen Seminartermin
oder ein Individualtraining nur für Sie allein.
Kurszeiten:
Montag 09:30 bis 17:00 Uhr
Dienstag bis Donnerstag 09:00 bis 17:00 Uhr
Freitag seminarabhängig
Halbtag von 09:00 bis 12:30 Uhr
Ganztag von 09:00 bis 17:00 Uhr
(Sofern nicht gesondert angegeben oder individuell vereinbart)
Kursdauer:
5 Tage (40 Lerneinheiten)
Kursbeitrag EUR 3500,- zzgl. Ust. (EUR 4200,- inkl. Ust.)
Im Preis sind die
Kursunterlagen und die
Pausengetränke enthalten.
Auch für dieses Seminar bieten wir Ihnen:
Durchführungsgarantie,
Nutzengarantie
und
Investitionsgarantie
Profitieren auch Sie wie
unsere Kunden von der Qualität unserer Seminare und unseren Garantien.
Gerne senden wir Ihnen innerhalb von zwei Arbeitstagen ein individuelles Angebot oder einen
Kostenvoranschlag zu, der auch zur Vorlage bei
AMS, WAFF (genaue Adresse und SVNR wird benötigt) oder anderen Instituten verwendet werden kann.
Inhalt
Need for Security Analysis
Computer Security Concerns
Information Security Measures
Risk Analysis
Hardening Security
Security Policies
Sample Policies
Information Security Standards
Information Security Acts and Laws
TCP/IP Packet Analysis
Introduction to TCP/IP
TCP/IP Connection
Introduction to IPv6
TCP/IP Security
Internet Control Message Protocol (ICMP)
TCP/IP in Mobile Communications
Penetration Testing Methodologies
Introduction to Penetration Testing
Types of Penetration Testing
Phases of Penetration Testing
Penetration Testing Consultants
Ethics of a Licensed Penetration Tester
Communication Skills of a Penetration Tester
LPT Audited Logos
Customers and Legal Agreements
Why Do Organizations Need Pen Testing?
Penetration Testing ‘Rules of Behavior’
Legal Issues in Penetration Testing
How Much to Charge?
Rules of Engagement
Rules of Engagement (ROE)
Clauses in ROE
Steps for Framing ROE
Penetration Testing Planning and Scheduling
Test Plan and Its Purpose
Content of a Test Plan
Building a Penetration Test Plan
Test Plan Identifier
Test Deliverables
Penetration Testing Planning Phase Define the Pen Testing Scope
Staffing
Kickoff Meeting
Develop the Project Plan
Pre-penetration Testing Steps
Pre-penetration Testing Steps
Information Gathering
What Is Information Gathering?
Information Gathering Terminologies
Information Gathering Steps
Vulnerability Analysis
What Is Vulnerability Assessment?
Why Assessment
Vulnerability Classification
Types of Vulnerability Assessment
How to Conduct a Vulnerability Assessment
How to Obtain a High Quality Vulnerability Assessment
Vulnerability Assessment Phases
Vulnerability Analysis Stages
Comparing Approaches to Vulnerability Assessment
Characteristics of a Good Vulnerability Assessment Solution
Vulnerability Assessment Considerations
Vulnerability Assessment Reports
Vulnerability Report Model
Timeline
Types of Vulnerability Assessment Tools
Choosing a Vulnerability Assessment Tool
Criteria for Choosing a Vulnerability Assessment Tool
Best Practices for Vulnerability Assessment Tools
Vulnerability Assessment Tools
Report
Vulnerability Analysis Chart
External Penetration Testing
External Intrusion Test and Analysis
Why Is It Done?
Client Benefits
External Penetration Testing
Steps for Conducting External Penetration Testing
Recommendations to Protect Your System from External Threats
Internal Network Penetration Testing
Internal Testing
Steps for Internal Network Penetration Testing
Recommendations for Internal Network Penetration Testing+
Firewall Penetration Testing
What Is a Firewall?
What Does a Firewall Do?
Packet Filtering
What Can’t a Firewall Do?
How Does a Firewall Work?
Firewall Logging Functionality
Firewall Policy
Periodic Review of Information Security Policies
Firewall Implementation
Build a Firewall Ruleset
Maintenance and Management of Firewall
Hardware Firewall
Software Firewall
Types of Firewalls
Firewall Penetration Testing Tool: Firewall Test Agent
Firewall Penetration Testing Tools
Firewall Ruleset Mapping
Best Practices for Firewall Configuration
Steps for Conducting Firewall Penetration Testing
Document Everything
IDS Penetration Testing
Introduction to IDS
Application-based IDS
Multi-Layer Intrusion Detection Systems
Multi-Layer Intrusion Detection System Benefits
Wireless Intrusion Detection Systems (WIDSs)
Common Techniques Used to Evade IDS Systems
IDS Penetration Testing Steps
Recommendations for IDS Penetration Testing
Password Cracking Penetration Testing
Password - Terminology
Importance of Passwords
Password Types
Common Password Vulnerabilities
Password Cracking Techniques
Types of Password Attacks
How Are Passwords Stored in Windows?
LM Authentication
NTLM Authentication
Kerberos Authentication
LM, NTLMv1, and NTLMv2
How Are Passwords Stored in Linux?
Steps for Password Cracking Penetration Testing
Social Engineering Penetration Testing
What Is Social Engineering?
Social Engineering Pen Testing
Impact of Social Engineering on the Organization
Common Targets of Social Engineering
Requirements of Social Engineering
Steps in Conducting Social Engineering Penetration Test
Web Application Penetration Testing
Introduction to Web Applications
Web Application Components
Web App Pen Testing Phases
Testing for Web Server Vulnerabilities
Testing Configuration Management
Testing for Client-side Vulnerabilities
Testing Authentication Mechanism
Testing Session Management Mechanism
Testing Authorization Controls
Testing Data Validation Mechanism
Testing Web Services
Testing for Logic Flaws
SQL Penetration Testing
Introduction to SQL Injection
How Do Web Applications Work?
How Does SQL Injection Work?
SQL Injection Attack Paths
Impact of SQL Injection Attacks
Types of SQL Injection Attacks
SQL Injection Attack Characters
SQL Injection Cheat Sheet
SQL Injection Penetration Testing Steps
Best Practices to Prevent SQL Injection
Penetration Testing Reports and Post Testing Actions
Penetration Testing Deliverables
Writing Pen Testing Report
Pen Testing Report Format
Result Analysis
Post Testing Actions
Report Retention
Self-Study Module
Router and Switches Penetration Testing
Wireless Network Penetration Testing
Denial-of Service
Stolen Laptop, PDA's, Cell Phones Penetration Testing
Source Code Penetration Testing
Physical Security Penetration Testing
Surveillance Camera Penetration Testing
Database Penetration Testing
VoILP Penetration Testing
VPN Penetration Testing
Cloud Penetration Testing
Virtual Machine Penetration Testing
War Dialing
Virus and Trojan Detection
Log Management Penetration Testing
File Integrity Checking
Mobile Devices Penetration Testing
Telecommunication and Broadband Communication Penetration Testing
Email Security Penetration Testing
Security Patches Penetration Testing
Data Leakage Penetration Testing
SAP Penetration Testing
Standards and Compliance
Information System Security Principles
Information System Incident Handling and Response
Information System Auditing and Certification