Application security courses
Securing software and applications to prevent vulnerabilities that can be exploited by hackers. Regular code reviews and penetration testing are common practices.
CompTIA PenTest+ Course:
Planning and Scoping
- Explain the importance of scoping and organizational/customer requirements
- Demonstrate an ethical hacking mindset by maintaining professionalism and integrity
Information Gathering and Vulnerability Scanning
- Perform passive reconnaissance
- Perform active reconnaissance
- Analyze the results of a reconnaissance exercise
- Analyze the results of a reconnaissance exercise
Attacks and Exploits
- Research attack vectors and perform network attacks
- Research attack vectors and perform wireless attacks
- Research attack vectors and perform application-based attacks
- Research attack vectors and perform attacks on cloud technologies
- Explain common attacks and vulnerabilities against specialized systems
- Perform a social engineering or physical attack
- Perform post-exploitation techniques
Reporting and Communication
- Compare and contrast important components of written reports
- Analyze thendings and recommend the appropriateremediation within a report
- Explain the importance of communication during the penetration testing process
- Explain post-report delivery activities
Tools and Code Analysis
- Explain the basic concepts of scripting and software development
- Analyze a script or code sample for use in a penetration test
- Explain use cases of the following tools during the phases of a penetration test