This program provides participants with knowledge and skills to understand perspective of attacker’s tactics and strategies. Introduce the plan and preparation required to perform Penetration Testing at complex and hardening environment. Presents information based on key elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Appreciate Information Security from the point of view of both System Administrator and Computer Hacker.
At the end of the training, participants will understand the perspective of computer hacking and perform FCCH certification exam.