This 5-day training course will start from the basic cyber security concepts and will move forward to the phases of a vulnerability assessment and a penetration testing activity. The illustrated steps will mimic those performed during a real-world penetration test, and thus tools and techniques used in the real world for this type of activity will be shown. The course will cover a range of topics related to ethical hacking, including reconnaissance, scanning, enumeration, exploitation, post-exploitation, and reporting.
This course provides theoretical knowledge and skills in the Cloud Security field.
The content of the course includes the presentation of the elements at the base of preparation, implementation, maintenance, monitoring, and improvement of Security attitude in the cloud context. The teaching activity includes the review of changes that the Cloud imposes on governance, risk, and compliance processes. The risks characteristic of the Cloud is illustrated and the Cloud Audit techniques are evaluated.
This course will equip students with the knowledge, skills, and confidence needed to secure cloud-based infrastructure, applications, and data, and to help organizations minimize the risks associated with cloud computing.
Participants will learn how to:
The course will include a mix of lectures, hands-on exercises, and practical case studies to provide participants with a comprehensive understanding of penetration testing best practices.
Upon completion of the course, participants will have the knowledge and skills necessary to conduct effective penetration testing and simulate real-world attacks to help organizations identify and remediate security weaknesses.