FB Twitter Linkedin Instagram gpen giac certified penetration tester training Mohali | ITRONIX SOLUTION

GPEN – GIAC Certified Penetration Tester

The GPEN certification is for security personnel whose job duties involve assessing target networks and systems to find security vulnerabilities. Certification objectives include penetration-testing methodologies, the legal issues surrounding penetration testing and how to properly conduct a penetration test as well as best practice technical and non-technical techniques specific to conduct a penetration test.

The topic areas for training part follow:

Advanced Password Attacks
The candidate will be able to use additional methods to attack password hashes and authenticate.
Attacking Password Hashes
The candidate will be able to obtain and attack password hashes and other password representations.
Enumerating Users
The candidate will be able to enumerate users through different methods.
Exploitation Fundamentals
The candidate will be able to demonstrate the fundamental concepts associated with the exploitation phase of a pentest.
Initial Target Scanning
The candidate will be able to conduct port, operating system and service version scans and analyze the results.
Metasploit
The candidate will be able to use and configure the Metasploit Framework at an intermediate level.
Moving Files with Exploits
The candidate will be able to use exploits to move files between remote systems.
Password Attacks
The candidate will understand types of password attacks, formats, defenses, and the circumstances under which to use each password attack variation. The candidate will be able to conduct password guessing attacks.
Pen-testing Foundations
The candidate will be able to demonstrate the fundamental concepts associated with pen-testing.
Pen-testing Process
The candidate will be able to utilize a process-oriented approach to pentesting and reporting.
Penetration Testing using Power Shell
The candidate will demonstrate an understanding of the use of advanced Windows Power Shell skills during a penetration test.
Penetration Testing using the Windows Command Line
The candidate will demonstrate an understanding of the use of advanced Windows command line skills during a penetration test.
Reconnaissance
The candidate will understand the fundamental concepts of reconnaissance and will understand how to obtain basic, high level information about the target organization and network, often considered information leakage, including but not limited to technical and non technical public contacts, IP address ranges, document formats, and supported systems.
Scanning for Targets
The candidate will be able to use the appropriate technique to scan a network for potential targets.
Vulnerability Scanning
The candidate will be able to conduct vulnerability scans and analyze the results.
Web Application Attacks
The candidate will be able to utilize common web application attacks.
Web Application Reconnaisance
The candidate will demonstrate an understanding of the use of tools and proxies to discover web application vulnerabilities.