Penetration Testing

Penetration Testing

Penetration Testing

Learn To Think The Way Attackers Do

In Partnership With:
Ngee Ann Pol
View Course Brochure


View Brochure

Course Fee

Full Course Fees

SG Citizen (aged 21-39) or PR

SG Citizen (aged 40 & above)

Full Fees

$19,500

$19,500

$19,500

SkillsFuture Funding

-

$13,650 (70% Subsidy)

$17,550 (90% Subsidy)

Total Nett Fee

$19,500

$5,850

$1,950

GST (9%)

$1,755

$526.5

$526.5

Total Fee Payable

$21,255

$6,376.50

$2,476.50

Additional Funding: SkillsFuture Credits (up to $500), UTAP ($200-$500) & PSEA can be used to pay for course fees after subsidy

Learning Outcomes: 

    Participants will:

    • Identify and assess system vulnerabilities using advanced data gathering techniques.
    • Execute strategic system infiltration to simulate real-world cyber attacks.
    • Apply post-breach tactics to understand and mitigate the impact of security incidents.
    • Specialise in Web Application Security to protect against targeted web-based threats.
    • Develop a comprehensive skill set to enhance the security posture of digital assets against potential cyber threats.

    Course Syllabus:

    Chapter 01
    Collecting Information

    Information Gathering

    • Whois and Dmitry
    • Google and GHDB
    • Shodan CLI
    • DNS Reconnaissance
    • Online Databases

    Scanning

    • Nmap Scanning
    • NSE Scripting

    Enumeration

    • Services
    • Msfconsole
    • Enumeration Tools
    • Vulnerabilities Detection Methods
    • Nessus

    Exploitation

    • Brute Force Tools
    • Exploits Database
    • Msfconsole
    • Exploiting Manually

    Payloads

    • Msfvenom Payloads
    • Payloads Automation
    • Meterpreter
    Chapter 02
    Exploitation
    Question text goes here
    • Become familiar with different attack scenarios

    Post Exploitation Introduction

    • Local vs. Remote Exploits
    • Privilege Escalation
    • Persistence
    • Disabling Security

    Social Engineering

    • Online Services
    • BeEF
    • Phishing Frameworks
    • Advanced Techniques
    Chapter 03
    Post Exploitation
    Question text goes here
    • Become familiar with different attack scenarios

    WebApp Security Introduction

    • HTML Basics
    • About OWASP
    • XSS
    • LFI/RFI
    • Brute Force
    • SQL Injection
    • Web Payloads
    • Reverse Shell

    Burp Suite

    • Proxy
    • Repeater
    • Intruder
    • Encoder

    Chapter 04
    WebApp Security
    Question text goes here
    • Become familiar with different attack scenarios
    Chapter 05
    Question text goes here
    • Become familiar with different attack scenarios

    Training Schedule:

    Tailored To Client

    Tailored To Client
    Question text goes here

    Training Methodology:

    Apprenticeship-based Training

    • Experience hands-on learning with our demonstration method on a virtual/host machine, ensuring immersive understanding.
    • Our trainers prioritise showing over telling, explaining intricacies without relying on slides, offering direct engagement.
    • Bridge your knowledge gap by connecting theoretical concepts to practical cybersecurity applications, enhancing career readiness.

    Practice Labs

    • Engage in repeated practice sessions to solidify and reinforce your understanding.
    • Delve deeper with practice questions, encouraging students to explore interconnected topics and enhance comprehension.
    • Stimulate critical thinking through challenge questions, prompting students to seek solutions and broaden their problem-solving abilities.

    Assessment and Project

    • Equip yourself with the expertise and tools essential for navigating corporate networks safely.
    • Gain a comprehensive understanding of cyber-attacks to fortify your digital environment effectively.
    • Broaden your horizon by familiarising yourself with diverse cyber-attack scenarios and their implications.

    Question text goes here
    • Become familiar with different attack scenarios

    FAQs:

    Question text goes here
    • Become familiar with different attack scenarios
    Quick Info
    Programme Fee
    Custom Pricing
    Duration
    5 Days (8 hours/day)
    Schedule
    Tailored To Client
    Teacher-to-Student Ratio
    1:30
    Delivery Mode
    On-site
    Entry Requirement
    Schedule A Consultation
    View Course BrochureRegister NowBook Your SlotView Brochure

    Secure Your Future

    Find out more about how we can help you secure your future in cybersecurity

    Talk to us on
    WhatsApp!