- Identify real vulnerabilities in server and desktop operating systems and OS services
- Measure end-user response to social engineering attacks
- Locate and demonstrate weaknesses in customized web applications
- Test and tune information security defensive infrastructure
- Validate the security of system upgrades, modifications and patches
- Establish an audit train of your vulnerability management practices.
- Understanding the capabilities of CORE Impact, the leading penetration testing software.
If you are interested in an in-depth training session, then enrol on our 5 day Certified Ethical Hacker course.
We are the leading provider of IT security courses and recently won the EC-Council's 2009 Training Company of the Year Award for Europe.
ليست هناك تعليقات:
إرسال تعليق