Exam Objective:

Module 00: Penetration Testing Essential Concepts (Self-Study)

Module 01: Introduction to Penetration Testing and Methodologies

Module 02: Penetration Testing Scoping and Engagement Methodology

Module 03: Open-Source Intelligence (OSINT) Methodology

Module 04: Social Engineering Penetration Testing Methodology

Module 05: Network Penetration Testing Methodology – External

Module 06: Network Penetration Testing Methodology – Internal

Module 07: Network Penetration Testing Methodology – Perimeter Devices

Module 08: Web Application Penetration Testing Methodology

Module 09: Database Penetration Testing Methodology

Module 10: Wireless Penetration Testing Methodology

Module 11: Cloud Penetration Testing Methodology

Module 12: Report Writing and Post Testing Actions

Detailed Syllabus:

Module 00: Penetration Testing Essential Concepts (Self-Study)

Computer Network Fundamentals
TCP/IP protocol suite
IP Addressing and port numbers
Network Terminology
Network Security Controls
Network Security Devices
Network File System (NFS)
Windows Security
Unix/Linux Security
Virtualization
Web Server
Web Application
Web Markup and Programming Languages
Application Development Frameworks and their Vulnerabilities
Web API’s
Web Sub Components
Web Application Security Mechanisms
Working of Most Common Information Security Attacks
Information Security Standards, Laws and Acts

Module 01: Introduction to Penetration Testing and Methodologies

What is Penetration Testing?
Benefits of Conducting a Penetration Test
ROI for Penetration Testing
How Penetration Testing Differs from Ethical Hacking?
Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
Types of Penetration Testing
Penetration Testing: Cost and Comprehensiveness
Selecting an Appropriate Testing Type
Different Ways of Penetration Testing
Selecting the Appropriate Way of Penetration Testing
Common Areas of Penetration Testing
Penetration Testing Process
Penetration Testing Phases
Penetration Testing Methodologies
Need for a Methodology
LPT Penetration Testing Methodology
Penetration Testing Essentials

Module 02: Penetration Testing Scoping and Engagement Methodology

Penetration Testing: Pre-engagement Activities
Pre-engagement Activities
Request for Proposal (RFP)
Preparing Response Requirements for Proposal Submission
Setting the Rules of Engagement (ROE)
Establishing communication lines: Identify the Details of the Key Contact
Timeline
Time/Location
Frequency of meetings
Time of Day
Identify who can help you?
ROE Document
Handling Legal Issues in Penetration Testing Engagement
Penetration Testing Contract
Preparing for Test
Handling Scope Creeping during pen test

Module 03: Open-Source Intelligence (OSINT) Methodology

OSINT Gathering Steps
OSINT Through World Wide Web(WWW)
OSINT through Website Analysis
OSINT Through DNS Interrogation
Automating your OSINT Effort Using Tools/Frameworks/Scripts

Module 04: Social Engineering Penetration Testing Methodology

Social Engineering Penetration Testing
Skills Required to Perform Social Engineering Pen Test
Common Targets of Social Engineering Pen Test
Do Remember: Before Social Engineering Pen Test
Black Box or White Box?
Social Engineering Penetration Testing Steps
Social Engineering Penetration testing using E-mail Attack Vector
Social Engineering Penetration testing using Telephone Attack Vector
Social Engineering Penetration testing using Physical Attack Vector

Module 05: Network Penetration Testing Methodology – External

Network Penetration Testing
External vs. Internal Penetration Testing
External Network Penetration Testing
Internal Network Penetration Testing
Network Penetration Testing Process
White, Black or Grey-box Network Penetration Testing?
External Network Penetration Testing Steps
Port Scanning
OS and Service Fingerprinting
Vulnerability Research
Exploit Verification

Module 06: Network Penetration Testing Methodology – Internal

Internal Network Penetration Testing
Why Internal Network Penetration Testing?
Internal Network Penetration Testing Steps
Footprinting
Network Scanning
OS and Service Fingerprinting
Enumeration
Vulnerability Assessment
Windows Exploitation
Unix/Linux Exploitation
Other Internal Network Exploitation Techniques
Automating Internal Network Penetration Test Effort
Post Exploitation

Module 07: Network Penetration Testing Methodology – Perimeter Devices

Steps for Firewall Penetration Testing
Steps for IDS Penetration Testing
Steps for Router Penetration Testing
Steps for Switch Penetration Testing
Assessing Firewall Security Implementation
Assessing IDS Security Implementation
Assessing Security of Routers
Assessing Security of Switches

Module 08: Web Application Penetration Testing Methodology

White Box or Black Box?
Web Application Penetration Testing
Web Application Security Frame
Security Frame vs. Vulnerabilities vs. Attacks
Web Application Penetration Testing Steps
Discover Web Application Default Content
Discover Web Application Hidden Content
Conduct Web Vulnerability Scanning
Identify the Attack Surface Area
Tests for SQL Injection Vulnerabilities
Tests for XSS Vulnerabilities
Tests for Parameter Tampering
Tests for Weak Cryptography Vulnerabilities
Tests for Security Misconfiguration Vulnerabilities
Tests for Client-Side Scripting Attack
Tests for Broken Authentication and Authorization Vulnerabilities
Tests for Broken Session Management Vulnerabilities
Test for Web Services Security
Tests for Business Logic Flaws
Tests for Web Server Vulnerabilities
Tests for Thick Clients Vulnerabilities

Module 09: Database Penetration Testing Methodology

Database Penetration Testing Steps
Information Reconnaissance
Database Enumeration: Oracle
Database Enumeration: MS SQL Server
Database Enumeration: MySQL
Vulnerability and Exploit Research
Database Exploitation: Oracle
Database Exploitation: MS SQL SERVER
Database Exploitation: MySQL

Module 10: Wireless Penetration Testing Methodology

Wireless Penetration Testing
WLAN Penetration Testing Steps
RFID Penetration Testing Steps
NFC Penetration Testing Steps
Mobile Device Penetration Testing Steps
IoT Penetration Testing Steps
Wireless Local Area Network (WLAN) Penetration Testing
RFID Penetration Testing
NFC Penetration Testing
Mobile Device Penetration Testing
IoT Penetration Testing

Module 11: Cloud Penetration Testing Methodology

Distribution of Public Cloud Services: AWS, Azure, Google Clouds Are on TOP Among Others
Cloud Computing Security and Concerns
Security Risks Involved in Cloud Computing
Role of Penetration Testing in Cloud Computing
Do Remember: Cloud Penetration Testing
Scope of Cloud Pen Testing
Cloud Penetration Limitations
Cloud Specific Penetration Testing
Cloud Reconnaissance
Identify the Type of Cloud to be Tested
Identify What to be Tested in Cloud Environment
Identify the Tools for Penetration Test
Identify What Allowed to be Tested in Cloud Environment
Identify Which Tests are Prohibited
AWS’s Provision for Penetration Testing
Azure’s Provision for Penetration Testing
Google Cloud’s Provision for Penetration Testing
Identify Date and Time for Penetration Test
Cloud Specific Penetration Testing
Recommendations for Cloud Testing

Module 12: Report Writing and Post Testing Actions

Penetration Testing Deliverables
Goal of the Penetration Testing Report
Types of Pen Test Reports
Characteristics of a Good Pen Testing Report
Writing the Final Report
Document Properties/Version History
Sign-off Document Template
Post-testing Actions for Organizations

If You Like What We Do Here On PentesterWorld, You Should Consider:

Stay Connected to: Twitter | Facebook

Subscribe to our email updates: Sign Up Now

 

We are thankful for your support.