ABOUT THE COURSES
A penetration test is done to evaluate the security of a computer system or network by simulating an attack by a malicious user / hacker. The process involves active exploitation of security vulnerabilities that may be present due to poor or improper system configuration, known and / or unknown hardware or software flaws, or operational weaknesses in process or design.
This analysis is carried out from the position of a potential attacker, to determine feasibility of an attack and the resulting business impact of a successful exploit. Usually this is presented with recommendations for mitigation or a technical solution.
What You Will Learn
The following tables list Microsoft Certifications by name and describe how they enable IT professionals to display and validate their skills and experience.
|Module 01:||Introduction of Security Assessment|
|Module 03:||Introduction of Security Assessment|
|Module 04:||Application Security Architecture Review|
|Module 05:||Automated External Application Scanning|
|Module 06:||Automated source code Analysis|
|Module 07:||Automated source code Analysis|
|Module 08:||Manual Security-Focused Code Review|