Module 5 : Post-Exploitation and Reporting
Procedures for maintaining access, lateral movement, clean-up processes, and compiling
Procedures for maintaining access, lateral movement, clean-up processes, and compiling
Develop skills to exploit network, application, and wireless vulnerabilities. Emphasis
Review vulnerability scanning tools, management processes, and identifying weaknesses across
Techniques for gathering information, passive/active reconnaissance, and the use of
Explore the fundamentals of penetration testing, scoping and planning engagements,