| Available 24 Hours Monday - Friday | 01344 203999
Please enter course

Got a quick question or comment?
Send us enquiry.

Enter your details and we will call you back to discuss your requirements

Penetration Testing

  • Recommended for IT professionals who have an interest in specialising in Penetration Testing
  • Improve your knowledge on how to supervise and monitor others in this field
  • Learn the differences between a Hacker and a Penetration Tester
  • GUARANTEED LOWEST PRICE IN THE INDUSTRY
  • OSSTMM provides a complete methodology on performing security testing
  • Courses delivered by world class IT Security training instructors in luxury venues 
  • Penetration Testing includes material and manuals
  • Book Online or Call 01344 203999 to speak to an IT Security training advisor today
Schedule

Course Dates, Locations & Prices (Top) | View Course Info

Course Name Date Location Duration Price Book Online
Tools and Techniques for Penetrating Testing 04/05/2017 Limited Seats Doncaster
2 days £2299 Book now Enquire
Tools and Techniques for Penetrating Testing 04/05/2017 Limited Seats Guildford
2 days £2299 Book now Enquire
Tools and Techniques for Penetrating Testing 04/05/2017 Limited Seats London
2 days £1699 Book now Enquire
Tools and Techniques for Penetrating Testing 04/05/2017 Limited Seats Preston
2 days £2299 Book now Enquire
Tools and Techniques for Penetrating Testing 04/05/2017 Limited Seats Darlington
2 days £2299 Book now Enquire
Tools and Techniques for Penetrating Testing 04/05/2017 Limited Seats Poole
2 days £2299 Book now Enquire
Tools and Techniques for Penetrating Testing 04/05/2017 Limited Seats Buxton
2 days £2299 Book now Enquire
Tools and Techniques for Penetrating Testing 04/05/2017 Limited Seats Teesside
2 days £2299 Book now Enquire
Tools and Techniques for Penetrating Testing 04/05/2017 Limited Seats Newcastle
2 days £1999 Book now Enquire
Tools and Techniques for Penetrating Testing 04/05/2017 Limited Seats Edinburgh
2 days £1999 Book now Enquire
Tools and Techniques for Penetrating Testing 04/05/2017 Limited Seats Maidstone
2 days £2299 Book now Enquire
Tools and Techniques for Penetrating Testing 04/05/2017 Limited Seats Bromley
2 days £2299 Book now Enquire
Tools and Techniques for Penetrating Testing 04/05/2017 Limited Seats Peterborough
2 days £2299 Book now Enquire
Tools and Techniques for Penetrating Testing 04/05/2017 Limited Seats Heathrow
2 days £2299 Book now Enquire
Tools and Techniques for Penetrating Testing 04/05/2017 Limited Seats Harrogate
2 days £2299 Book now Enquire
Tools and Techniques for Penetrating Testing 04/05/2017 Limited Seats Bracknell
2 days £2299 Book now Enquire
Tools and Techniques for Penetrating Testing 04/05/2017 Limited Seats Warrington
2 days £2299 Book now Enquire
Tools and Techniques for Penetrating Testing 04/05/2017 Limited Seats Swindon
2 days £2299 Book now Enquire
Tools and Techniques for Penetrating Testing 04/05/2017 Limited Seats Corby
2 days £2299 Book now Enquire
Tools and Techniques for Penetrating Testing 04/05/2017 Limited Seats Burton Upon Trent
2 days £2299 Book now Enquire

Course Information (Top) | View Dates & Pricing

Overview

Introduction

This five-day Penetration Testing using OSSTMM course provides candidates with the principles of penetration testing, including hands-on practice with some of the tools available.

Individuals will learn the differences between a hacker and a Penetration Tester before going on to study the types of procedures followed by the professional penetration tester.

Common vulnerabilities of computer systems are discussed along with methods used by penetration testers to take advantage of them.

This course is beneficial for IT professionals who will be required to test their own internal networks of networks of an external client.

The Open Source Security Testing Methodology Manual (OSSTMM) provides a complete methodology on performing security testing from the outside to the inside.

It is beneficial in testing from the internal network to the DMZ and the DMZ to the internal network.

Who Should Attend

  • Recommended for IT Professionals who have an interest in specializing in Penetration Testing or those who wish to improve their knowledge about the subject to supervise or monitor others in the field.

Course Content

This course covers the following content:

ISECOM and Methodologies

  • Overview of ISECOM
  • Rules of Engagement
  • Rule of Thumb
  • The Process
  • The Security Map
  • Risk Assessment
  • Sections, Modules and
  • Tasks

Network Surveying

  • Name Server Responses
  • Outer wall of Network
  • Tracks from Target
  • Network
  • Information Leaks

System Services

  • Identification
  • Enumerate systems and ports
  • Identify services and systems

War-Dialling

  • Attacks, Methods
  • Precautions
  • Tools & Software

Internal Penetration Testing

  • Mapping the network
  • NT & Unix Enumeration
  • Building a Testing

Environment

  • Windows PC
  • Linux PC

Vulnerabilities

  • Keeping up to date
  • Monitoring & Intrusion
  • Detection (Lack of)
  • Network Architecture
  • Network File System
  • NT Ports 135-139 (NetBIOS & File Sharing)
  • NT Null Connection
  • Poor Passwords & User Ids
  • Remote Administration
  • Services, Services started by
  • default
  • Simple Mail Transport
  • Protocol
  • Application Holes
  • Clear Text Services
  • Default Accounts
  • Domain Name Service
  • (DNS), File Permissions
  • FTP and Telnet
  • Modems, Web server
  • Viruses and hidden code
  • Buffer overflows
  • Social Engineering
  • Definition
  • Various methods

Automated Vulnerability

  • Scanners
  • Use in Pen Testing
  • Limitations

Password Crackers

  • Application crackers
  • OS Crackers

Competitive Intelligence Scouting

  • Discovery Profiling Tools
  • Sniffers
  • Tools to capture network traffic

Intrusion Detection Systems

  • What is Intrusion Detection
  • What is Intrusion
  • Detection?
  • IDS Methodologies
  • IDS Deployment
  • Manager to Agent
  • Communication
  • Optimal Agent Placement
  • IDS Applications and Rules
  • IDS Actions, Logging &
  • Concerns
  • IDS Evasion, Pitfalls

Firewalls

  • Types of Firewall
  • Advantages and
  • Disadvantages of each type
  • Bastion Hosts
  • DMZ (Demilitarised Zone)
  • Network Address
  • Translation
  • Firewall design principles
  • Common Firewall
  • Topologies
  • Perimeter Routers
  • Evading Firewalls
FAQs
  • Course Availability

    The spaces remaining on all courses across the website reflect the availability of the maximum printed course materials and equipment available in stock for any given event. If the spaces remaining do not appear, then there is comfortably enough lead time to provision course materials and equipment upon booking.


  • What time shall I arrive at the venue?

    Please arrive at the venue at 8:45am.


  • Who should attend this course?

    This course is recommended for IT Professionals who have an interest in specializing in Penetration Testing or those who wish to improve their knowledge about the subject to supervise or monitor others in the field.


  • Do you offer support for the course?

    We are able to provide support via phone & email prior to attending, during and after the course.


  • What is included in the course?

    Delegate pack consisting of course notes and exercises, Manual, Experienced Instructor, and Refreshments


  • What is the duration of this course?

    This course is 5 days.


  • How long until I receive the course confirmation details?

    Once your booking has been placed and confirmed, you will receive an email which contains your course location, course overview, pre-course reading material (if required), course agenda and payment receipts


  • Which topics are included in this course?

    This course includes the following topics: ISECOM and Methodologies, Network Surveying, System Services, Automated Vulnerability, Password Crackers, Competitive Intelligence Scouting, Intrusion Detection Systems, Firewalls, War-Dialling, Internal Penetration Testing, Environment and Vulnerabilities.


What's Included?
  • Delegate pack consisting of course notes and exercises
  • Manual
  • Experienced Instructor
  • Refreshments

best-price      customer-charter

Why Choose us?
  • Certified and Approved

    We're accredited by leading training organisations including AXELOS, BCS, The Chartered Institute of IT, APMG, PMI, The Open Group and many more.


  • Best Price Guarantee

    As well as providing the best training in the industry, we'll also provide it at the best price. We'll beat any like for like quote from our competitors.


  • World's Largest Global Training Provider

    We offer training in the more locations than any other provider with over 1200 training locations globally.


  • Trusted by Industry Leading Brands

    We're proud of our range of high-profile clients including brands such as JP Morgan, HSBC, British Airways, BskyB, Sony, AT&T to name only a few


  • Hands-on, Expert Instructor-led Classroom Training

    All our trainers are hand-picked, highly experienced, subject matter experts, who can not only train you but also use real world and practical examples.


  • Dedicated 24/7 Support

    We are here to provide help and guidance before, during and after your training course to make sure you get the most from your training

Reviews

29. Mar

Pince2-Roz ward

very good course, learnt a lot in 5 days

Read more >>

29. Mar

Prince 2 - Foundation and Practitioner

Prince 2 - Foundation and Practitioner - Tasha BarclayExcellent tutor with the right pitch of humour and information with what is a very dry subject. I would recommend this course.

Read more >>

 Contact Us  More Courses

Send us your onsite requirements and we will
provide a tailor made course for you!

Happy Customers

There hasn't been any testimonials submitted to this topic