top of page
hmlogo_edited_edited.jpg

Professional Management of Penetration Testing

Laptop Keyboard

About The Course

Security assessments, penetration testing or any kind of security test should be performed in a way that is relevant to the buyer of the test, the context in which the IT services or products are used and the expectations of protection. The process and methodology should be reproduceable and should not endanger the scope to be tested. This course teaches you on what to expect and what the boundaries are, how to create better tests, scopes and reporting and generally making sure both sides of the table can get more value from their budget and time.

In this course you will learn

Communication

Get introduced to the world of professional security testing, history, stakeholders, language and testing approaches.

Threat Modeling

Learn how to find the trade-offs between what is expected vs reality and how to identify relevant threat scenarios.

Execution

Learn how to plan and execute a security test and what decisions to make during the test to achieve the desired results.

Reporting

Learn how to write meaningful reports for executives and technical staff, what metrics to use and how to help your client.

Syllabus

  • Introduction

  • Cyber Security Industry

  • Terminology

  • Risk Assessment

  • Planning

  • Constraints, Context & Limitations Legal Aspects

  • Ethics

  • Threat Modeling

  • Running a project

  • Scope & Prerequisites Execution

  • Communication

  • Reporting

  • Example Case Study

  • Assignment

  • Your Questions

Video Game
Image by Headway

Who is this course for?

This course is perfect for those who have started in security testing and want to elevate their skills to a more efficient and professional level, as well as individuals eager to launch a career in professional security assessment and penetration testing management.

Location

On site or remote

Max. Attendees

10

Language

English

Duration

1 day

Course Details

Your Instructor

A cyber security industry authority and ethical hacker with over 23 years of authentic cyber security consultancy - at your service.

point.jpg

Tom Van de Wiele

Ethical Hacker | Lead Advisor | Founder Hacker Minded

bottom of page