Key issues plaguing the information security world and information security laws and standards
Fundamentals of ethical hacking
Information security threats and vulnerabilities
Different types of malware
Different types of password-cracking techniques and countermeasures
Social engineering techniques, insider threats, identity theft, and countermeasures
Network level attacks (sniffing, denial-of-service, and session hijacking) and countermeasures
Application-level attacks (web-server attacks, web application attacks, and SQL injection) and countermeasures
Wireless encryption, wireless threats, and countermeasures
Mobile platform attack vector, mobile device management, mobile security guidelines, and security tools
IoT and OT concepts, attacks, and countermeasures
Cloud computing technologies, cloud computing threats, attacks, and security techniques
Fundamentals of pen testing
Role: Identify and exploit vulnerabilities in systems to help organizations improve their security.
Responsibilities: Conduct penetration tests, report findings, recommend security improvements, and simulate cyber-attacks.
Role: Identify and exploit vulnerabilities in systems to help organizations improve their security.
Responsibilities: Conduct penetration tests, report findings, recommend security improvements, and simulate cyber-attacks.
Role: Identify and exploit vulnerabilities in systems to help organizations improve their security.
Responsibilities: Conduct penetration tests, report findings, recommend security improvements, and simulate cyber-attacks.
Role: Identify and exploit vulnerabilities in systems to help organizations improve their security.
Responsibilities: Conduct penetration tests, report findings, recommend security improvements, and simulate cyber-attacks.
Role: Identify and exploit vulnerabilities in systems to help organizations improve their security.
Responsibilities: Conduct penetration tests, report findings, recommend security improvements, and simulate cyber-attacks.
Role: Identify and exploit vulnerabilities in systems to help organizations improve their security.
Responsibilities: Conduct penetration tests, report findings, recommend security improvements, and simulate cyber-attacks.
Role: Identify and exploit vulnerabilities in systems to help organizations improve their security.
Responsibilities: Conduct penetration tests, report findings, recommend security improvements, and simulate cyber-attacks.
Role: Identify and exploit vulnerabilities in systems to help organizations improve their security.
Responsibilities: Conduct penetration tests, report findings, recommend security improvements, and simulate cyber-attacks.
Role: Identify and exploit vulnerabilities in systems to help organizations improve their security.
Responsibilities: Conduct penetration tests, report findings, recommend security improvements, and simulate cyber-attacks.
Role: Identify and exploit vulnerabilities in systems to help organizations improve their security.
Responsibilities: Conduct penetration tests, report findings, recommend security improvements, and simulate cyber-attacks.
Role: Identify and exploit vulnerabilities in systems to help organizations improve their security.
Responsibilities: Conduct penetration tests, report findings, recommend security improvements, and simulate cyber-attacks.
Role: Identify and exploit vulnerabilities in systems to help organizations improve their security.
Responsibilities: Conduct penetration tests, report findings, recommend security improvements, and simulate cyber-attacks.
Role: Identify and exploit vulnerabilities in systems to help organizations improve their security.
Responsibilities: Conduct penetration tests, report findings, recommend security improvements, and simulate cyber-attacks.
Role: Identify and exploit vulnerabilities in systems to help organizations improve their security.
Responsibilities: Conduct penetration tests, report findings, recommend security improvements, and simulate cyber-attacks.
Role: Identify and exploit vulnerabilities in systems to help organizations improve their security.
Responsibilities: Conduct penetration tests, report findings, recommend security improvements, and simulate cyber-attacks.
Role: Identify and exploit vulnerabilities in systems to help organizations improve their security.
Responsibilities: Conduct penetration tests, report findings, recommend security improvements, and simulate cyber-attacks.