Penetration testing (also called PenTesting) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.
Pen tests can be automated with software applications or they can be performed manually. Either way, the process includes gathering information about the target before the test (reconnaissance), identifying possible entry points, attempting to break in (either virtually or for real) and reporting back the findings.
The main objective of penetration testing is to determine security weaknesses. A pen test can also be used to test an organization's security policy compliance, its employees' security awareness and the organization's ability to identify and respond to security incidents.
Aluminium Security provides intensive, immersion course designed to help you and your staff master the practical steps necessary for defending systems, website, server and networks against the most dangerous threats - the ones being actively exploited. The courses are full of important and immediately useful techniques that you can put to work as soon as you return to your offices.
Aluminium Security courses are taken in a multimedia classroom settings with our certified instructors. Each year, Aluminium Security courses educate more than 100 people in Bangladesh and internationally.
[+] Professional Penetration Testing and Information Security Course:
Aluminium Security is with their new version of Security Course, Professional Penetration Testing and Information Security Course. This is the most advanced Penetration Testing and Information Security Course in ASIA. All exclusive and most advanced Penetration Testing and Information Security Classes are in this course.
There are more than twenty two official classes in this Professional Penetration Testing and Information Security Course of Aluminium Security. The following topics are taken in Exclusive course:
[+] Class: 1
[-] Introduction to Penetration Testing
[-] Emotion and Attitude of Penetration Testing
[+] Class: 2
[-] Ethical Hacking & Penetration Testing
[-] Types of Penetration Testing
[-] Restriction of Penetration Testing
[-] Steps of Penetration Testing
[+] Class: 3
[-] Target or Goal
[-] Formal Methodology
[-] OSSTMM Formal Methodology
[-] NIST SP 800-42 Formal Methodology
[+] Class: 4
[-] TRAWG Formal Methodology
[-] OCTAVI Formal Methodology
[-] Service Enumeration or Finger Printing
[+] Class: 5
[-] Vulnerability Assessment
[-] Operating System Vulnerability Assessment
[-] Website Vulnerability Assessment
[+] Class: 6
[-] Web Server Vulnerability Assessment
[-] Database System Vulnerability Assessment
[+] Class: 7
[-] Vulnerability Exploitation
[-] Exploit or Root Access
[+] Class: 8
[-] Social Engineering
[-] Human Attitude Resourcing
[+] Class: 9
[-] Human Attitude Resourcing -2
[-] Human Brain Hypnosis
[+] Class: 10
[-] Operating System Penetration Testing -1
[+] Class: 11
[-] Operating System Penetration Testing -2
[+] Class: 12
[-] Virus and Worm Program
[-] Spyware Program
[+] Class: 13
[-] Trojan or RAT Program
[-] Antivirus and Firewall
[-] Full Manually Operating System Penetration Testing
[+] Class: 14
[-] Website Penetration Testing
[-] Platform Identification
[-] SQL Injection Vulnerability
[-] Login Bypass Vulnerability and Penetration Testing
[+] Class: 15
[-] Basic SQL Injection Vulnerability and Penetration Testing
[-] Error Base SQL Injection Vulnerability and Penetration Testing
[-] Blind SQL Injection Vulnerability and Penetration Testing
[-] Security
[+] Class: 16
[-] XSS Vulnerability
[-] Basic XSS Vulnerability and Penetration Testing
[-] Persistent XSS Vulnerability and Penetration Testing
[+] Class: 17
[-] Non- Persistent XSS Vulnerability and Penetration Testing
[-] DOM Vulnerability and Penetration Testing
[-] Security
[+] Class: 18
[-] CMS Penetration Testing
[-] Wordpress CMS Penetration Testing
[-] Wordpress CMS Plug-in Penetration Testing
[-] Wordpress CMS Theme Penetration Testing
[+] Class: 19
[-] Joomla CMS Penetration Testing
[-] Joomla CMS Plug-in Penetration Testing
[-] Joomla CMS Theme Penetration Testing
[+] Class: 20
[-] Server Penetration Testing
[-] Linux Server Penetration Testing
[-] Windows Server Penetration Testing
[-] Security
[+] Class: 21
[-] DNS
[-] DNS Hijacking
[-] DNS Spoofing
[-] DNS Server (Domain Register) Penetration Testing
[-] Cpanel and WHM Security
[+] Class: 22
[-] Zero and Exploit
[-] Zero and Exploit Writing
[-] POC Writing
[+] Class: 23
[-] Course Discussion and Consultation
[-] Celebrating
(NB: For any unfortunate issue class configuration may be changed...)
We hope this advanced Penetration Testing and Information Security Course will be better than our previous courses and oblige you to be a Professional Penetration Tester and Information Security Expert.
# Course Service Charge:
22,000/- BDT ( Three Installments )
Twenty Two Thousands BDT only.
# 46 Hours
# Online Admission Process
Step One: Download and fill up the registration form.
Step Two: Send it via email to mail@amusec.com
NB: We will try to give you a notification in a very short time after sending email.
For any kind of information please Connect with us or Helpline: +88 01515 26 38 68