As a cybersecurity professional, you have a unique
responsibility to find and understand your organization's
vulnerabilities and to work diligently to mitigate them before the bad
guys pounce.
Are you ready? SEC560, the flagship SANS course for
penetration testing, fully arms you to address this duty head-on.
THE MUST-HAVE COURSE FOR EVERY WELL-ROUNDED SECURITY PROFESSIONAL
With
comprehensive coverage of tools, techniques, and methodologies for
network penetration testing, SEC560 truly prepares you to conduct
high-value penetration testing projects step-by-step and end-to-end.
Every organization needs skilled information security personnel who can
find vulnerabilities and mitigate their effects, and this entire course
is specially designed to get you ready for that role. The course starts
with proper planning, scoping and recon, then dives deep into scanning,
target exploitation, password attacks, and web app manipulation, with
over 30 detailed hands-on labs throughout. The course is
chock full of
practical, real-world tips from some of the world's best penetration
testers to help you do your job safely, efficiently...and masterfully.
LEARN THE BEST WAYS TO TEST YOUR OWN SYSTEMS BEFORE THE BAD GUYS ATTACK
SEC560
is designed to get you ready to conduct a full-scale, high-value
penetration test - and on the last day of the course you'll do just
that. After building your skills in comprehensive and challenging labs
over five days, the course culminates with a final full-day, real-world
penetration test scenario. You'll conduct an end-to-end pen test,
applying knowledge, tools, and principles from throughout the course as
you discover and exploit vulnerabilities in a realistic sample target
organization, demonstrating the knowledge you've mastered in this
course.
EQUIPPING SECURITY ORGANIZATIONS WITH COMPREHENSIVE PENETRATION TESTING AND ETHICAL HACKING KNOW-HOW
You
will learn how to perform detailed reconnaissance, studying a target's
infrastructure by mining blogs, search engines, social networking sites,
and other Internet and intranet infrastructures. Our hands-on labs will
equip you to scan target networks using best-of-breed tools. We won't
just cover run-of-the-mill options and configurations, we'll also go
over the lesser known but super-useful capabilities of the best pen test
toolsets available today. After scanning, you'll learn dozens of
methods for exploiting target systems to gain access and measure real
business risk.
You'll dive deep into post-exploitation, password
attacks, and web apps, pivoting through the target environment to model
the attacks of real-world bad guys to emphasize the importance of
defense in depth



No comments:
Post a Comment