Home / Training / Penetration Testing: Audit Simulation

Penetration Testing: Audit Simulation

Immerse yourself in a realistic PenTest and learn to audit your IS security in real-world situations.

Objective

This course will teach you how to implement a real PenTest or Penetration Testing audit procedure on your IS. Trainees will be immersed in a practical case as close as possible to a real business situation. Indeed, PenTesting is a highly technical intervention that determines the potential and actual effectiveness of security applied to systems, networks, and information confidentiality.

Specific objectives:

  • Learn to write a professional audit report
  • Experience a real Audit situation

Prerequisites

  • Have attended or have the level of the HSA course

General Information

  • Code: PNT
  • Duration: 5 days
  • Schedule: 8:30 AM - 5:30 PM
  • Location: Training Center, North Urban Center

Target Audience

  • Security consultants
  • Engineers / Technicians
  • System / Network administrators

Resources

  • Course materials
  • 40% demonstration
  • 40% theory
  • 20% practical exercises

Program

  • Day 1
    • Audit methodology
    • Objectives and types of PenTests
    • What is a PenTest?
    • The PenTest cycle
    • Different types of attackers
    • Types of audits (Black Box, White Box, Gray Box)
    • Advantages of PenTesting
    • Limitations of PenTesting
    • Special cases (Denial of Service, Social Engineering)
    • Regulatory aspects
    • Auditor responsibility
    • Common constraints
    • Legislation: legal articles
    • Precautions
    • Key points of the mandate
    • Elements of report writing
    • Importance of the report
    • Composition (General summary, Technical summary)
    • Risk assessment
    • Examples of impacts
    • Putting yourself in the client's shoes
    • Review of main attack techniques and tools used
  • Days 2, 3 and 4
    • Audit simulation on a concrete case
    • Application of methodological and technical tools
    • Realistic business scenario
    • Trainer guidance
    • Exploitation of vulnerabilities
    • Formatting findings for the report
  • Day 5
    • Report preparation
    • Formatting collected information
    • Application of methodology
    • Report writing
    • Overall system security analysis
    • Description of found vulnerabilities
    • Report transmission
    • Necessary precautions
    • Report transmission methodology
    • What to do after transmitting the report?

Do not hesitate to contact our experts for any additional information, free study and calculation of an audit service.

Information security is essential for any business that needs to protect and enhance its information assets.

Contact us