The aim of this training is to educate participants on the methodology, methods and current penetration testing tools and how to use them. This will be useful for the awareness of the necessary tests and attack methods towards a real attacker profile.
During training, participants will be given penetration testing requirement examples, common holes in security and the reasons behind them, the techniques used by the tools and other professional penetration testing experiences. Penetration testing with Kali (Pentest) is very extensive and covers almost all information security gaps, therefore participants will reach an entry level proficiency regarding these areas. During training many hacking tools and their purposes will be addressed, but due to the mass of these tools, excercises will be carried out with the most appropriate tools and their concepts.
Participants must have ample knowledge of basic network and application technologies.
Penetration testing experts, information security and information technology auditors, information technologies risk and accord experts, system and network executives can participate.