System Testing Procedures

Ramasankara Rao

In this course, you will be introduced to general concepts and methodologies rel

+ show more

Price
RM2,300.00
HRDC Non-Claimable

Upskill
Part Time
Online
40 Hours: 2pm - 6pm
Upcoming Courses
What to Expect

After completing this course you should be able to:

  • Gather information to prepare for exploitation then perform a vulnerability scan and analyse results.
  • Explain the importance of planning and key aspects of compliance-based assessments.
  • Utilise report writing and handling best practices explaining recommended mitigation strategies for discovered vulnerabilities.
  • Conduct information gathering exercises with various tools and analyse output and basic scripts (limited to: Bash, Python, Ruby, Exploit network, wireless, application, and RF-based vulnerabilities,
  • PowerShell). summarize physical security attacks, and perform post-exploitation techniques.
Who Should Attend This Course

Cybersecurity professionals involved in hands-on penetration testing to identify, exploit, report, and manage vulnerabilities on a network.

Prerequisites

Intermediate knowledge of information security concepts, including but not limited to identity and access management (IAM), cryptographic concepts and implementations, computer networking concepts and implementations, and common security technologies. Practical experience in securing various computing environments, including small to medium businesses, as well as enterprise environments.

General Program

Lesson 1: Planning and Scoping Penetration Tests

  • Introduction to Penetration Testing Concepts
  • Plan a Pen Test Engagement
  • Scope and Negotiate a Pen Test Engagement
  • Prepare for a Pen Test Engagement

Lesson 2: Conducting Passive Reconnaissance

  • Gather Background Information
  • Prepare Background Findings for Next Steps

Lesson 3: Performing Non-Technical Tests

  • Perform Social Engineering Tests
  • Perform Physical Security Tests on Facilities

Lesson 4: Conducting Active Reconnaissance

  • Scan Networks
  • Enumerate Targets
  • Scan for Vulnerabilities
  • Analyze Basic Scripts

Lesson 5: Analyzing Vulnerabilities

  • Analyze Vulnerability Scan Results
  • Leverage Information to Prepare for Exploitation

Lesson 6: Penetrating Networks

  • Exploit Network-Based Vulnerabilities
  • Exploit Wireless and RF-Based Vulnerabilities
  • Exploit Specialized Systems

Lesson 7: Exploiting Host-Based Vulnerabilities

  • Exploit Windows-Based Vulnerabilities
  • Exploit *nix-Based Vulnerabilities

Lesson 8: Testing Applications

  • Exploit Web Application Vulnerabilities
  • Test Source Code and Compiled Apps

Lesson 9: Completing Post-Exploit Tasks

  • Use Lateral Movement Techniques
  • Use Persistence Techniques
  • Use Anti-Forensics Techniques

Lesson 10: Analyzing and Reporting Pen Test Results

  • Analyze Pen Test Data
  • Develop Recommendations for Mitigation Strategies
  • Write and Handle Reports Conduct Post-Report-Delivery Activities
Certificate

Certificate of Attendance

  1. Will I get a certificate at the end of the course?

    Complete Reskill Programs: Absolutely! The certificate will be issued by airasia academy and powered by Google Cloud.

    Byte Sized Courses: Yes, we will award you with a certificate for all byte-sized courses with EIGHT (8) learning hours and above. The certificate will be issued by airasia academy and powered by Google Cloud. If you completed less than 8 hours, no certificate will be given.

    BINA Digital: Yes, we will award you with a certificate upon full attendance of the programme. The certificate will be issued by airasia academy and powered by Google Cloud.

  2. Can I get a job after attending the course?

    The certificate from airasia academy is recognised by the industry which is sufficient to land you a job. But, if you manage to stand out and earn excellent results, our trainers may recommend you to companies within the airasia group and Google Cloud ecosystem, or to their extensive network of businesses. That means you will have a good shot kickstarting a new career!

  3. Who can I refer to get more insight of the courses?

    You may drop us a WhatsApp message at 010-5008787. Kindly take note that our working hours are 9 am - 6 pm from Monday to Friday and our friendly team will reply to you as soon as we can. However, do expect a slight delay in reply in enquiries over the weekend. Or you can follow our social media accounts @airasiaacademy (Facebook, Instagram, Linkedin)

  4. What payment methods do you accept?

    We currently accept debit card and credit card. We're also happy to announce that we now have interest-free* instalment plans!

    *Interest-Free Instalment plans are currently available for ILT courses only, and applies to Maybank and Public Bank credit card holders, with a minimum purchase of RM500 and above.

  5. Do you offer any free learning resources?

    Yes, we do! Kindly refer to the Resources page. We have conducted free introductory sessions via our YouTube channel where you can watch it anytime and anywhere.

  6. What is the difference between RCOC-B and RCOC-EVLOS Module 1?

    The Remote Pilot Certificate of Competency - Basic (RCoC-B) satisfies the requirements within the Specific category (medium risk category). The RCoC-B satisfies the competency requirements of a published *PDRA or *STS that involves *VLOS flights. The following operations usually falls within the specific category:

    • Agriculture
    • Flying the drone above 400ft
    • Flying Beyond Visual Line of Sight (BVLOS)
    • Pre-Defined Risk Assessment (PDRA)
    • Standard Scenario (STS)
    • Visual Line of Sight (VLOS)

    The Remote Pilot Certificate of Competency Extended Visual Line of Sight Module 1 (RCoC (EVLOS) Module 1) is an additional module which enables Extended Visual Line of Sight operations. The prerequisite for attending Module 1 is RCoC-B which will imply that all Remote Pilots are required to be competent on RCoC-B before attending the Module 1 course.

Meet your instructor
Ramasankara Rao

Rama is a cybersecurity and IT Infrastructure consultant and has been in the industry for around 20 years. He has been delivering trainings and providing cybersecurity consultancy to the US Navy based in Guam, a US territory from 2012. He has been a proctor for Cisco, delivering trainings and conducting exams to the aspiring Cisco Instructors around APAC, Gulf, and New Zealand.

As an entrepreneur, he was at IT Consultancy organisation in Brunei, providing cybersecurity trainings to the govt of Brunei (EGNC), Shell and IT Protective Security Services Sdn Bhd (ITPSS), Brunei. He delivered trainings to Multi-National Organisations like AT&T in Tokyo, Japan.

In Malaysia, he has been part of a number of training providers as a lead trainer delivering cybersecurity trainings from CISSP (Certified Information Systems Security Professional), CISM Certified Information Security Manager to EC-Council’s cybersecurity programs. He has also conducted Trainer the Trainer programs in Malaysia and Singapore on behalf of CompTIA.

Price
RM2,300.00
HRDC Non-Claimable

Upskill
Part Time
Online
40 Hours: 2pm - 6pm