Back

Penetration Testing for Executives
In-person

Penetration testing is a crucial component of any robust cybersecurity strategy. As an executive you have a crucial responsibility of running a successful and impactful pentest. In this course you will learn exactly how it is done.

Tarek

Lead Trainer

Description

Course Curriculum

Readiness Evaluation

3 lessons

1. Are you ready for a pentest?

2. When to do a pentest

3. When NOT to do a pentest

Business Cycle

3 lessons

4. Scoping

5. Budgeting

6. RFPs

Vendor Evaluation

3 lessons

7. Evaluating proposals

8. Evaluation criteria

9. Technical evaluation

Rules of Engagement

3 lessons

10. What are ROEs

11. What are some of the most common ROEs

12. What are some of controversial ROEs that might be road blockers

Kickoff

2 lessons

13. Before you start

14. Kickoff pitfalls

Pentesting Phases

7 lessons

15. Typical pentesting cycle

16. Recon/OSINT

17. Scanning and enumeration

18. Vulnerability Identification

19. Exploitation

20. Post-exploitation

21. Reporting

Reporting

3 lessons

22. Types and objectives of different reporting mediums

23. Bad report examples

24. Good report examples

Post-Pentest

3 lessons

25. Prioritization and remediation

26. Retesting

27. Communicating to C-suite