© AFI par Edgenda inc. |
This introductory course provides participants with the essential principles of penetration testing, offering both conceptual understanding and practical exposure. Learners will gain familiarity with tools, methodologies, and reporting practices, laying the foundation for more advanced ethical hacking training. |
Audience | Security analysts, junior penetration testers, system administrators, and IT professionals seeking foundational knowledge of ethical hacking. |
Prerequisites | - Basic knowledge of networks and operating systems
- Familiarity with command-line environments (Linux/Windows) is an asset
|
Objectives | - Understand the fundamentals of penetration testing and ethical hacking
- Learn key tools and frameworks used in pentesting
- Practice vulnerability identification and exploitation in a controlled environment
- Develop basic reporting skills for communicating findings
|
Contents | Module 1: Introduction to Ethical Hacking and Pentesting - Definition, scope, and ethics of penetration testing
- The legal and regulatory environment
- Overview of common attack vectors
Module 2: Methodologies and Frameworks - Reconnaissance and information gathering
- Scanning and vulnerability assessment
- Exploitation basicsPost-exploitation and maintaining access
Module 3: Tools of the Trade - Nmap, Metasploit, Burp Suite, Wireshark
- Hands-on lab: scanning a target system
- Best practices for safe testing environments
Module 4: Reporting and Next Steps - Structuring penetration test reports
- Communicating risks to technical and non-technical stakeholders
- Pathways for further learning and certifications
|