
SECURITY-ASSESSMENT
ABOUT THE COURSE
A penetration test is done to evaluate the security of a computer system or network by simulating an attack by a malicious user / hacker. The process involves active exploitation of security vulnerabilities that may be present due to poor or improper system configuration, known and / or unknown hardware or software flaws, or operational weaknesses in process or design.
This analysis is carried out from the position of a potential attacker, to determine feasibility of an attack and the resulting business impact of a successful exploit. Usually this is presented with recommendations for mitigation or a technical solution.
What You Will Learn
The following tables list Microsoft Certifications by name and describe how they enable IT professionals to display and validate their skills and experience.
Key Features
Who Should Attend
| |
Module 01: | Introduction of Security Assessment |
Module 02: | Techniques |
Module 03: | Introduction of Security Assessment |
Module 04: | Application Security Architecture Review |
Module 05: | Automated External Application Scanning |
Module 06: | Automated source code Analysis |
Module 07: | Automated source code Analysis |
Module 08: | Manual Security-Focused Code Review |