(+1) 418-261-7460
20 Rue St-Nicolas, Québec, QC, G1K 6T2, Canada
info@captosec.com
CAPTOSEC, Inc.CAPTOSEC, Inc.

Intrusion and vulnerability testing

  • Home
  • Intrusion and vulnerability testing

Intrusion and vulnerability testing

Targeted training to meet persistent needs

If you're looking for new challenges in IT security and you're having trouble convincing employers, or if you want to change field or function within your organisation and end up in cybersecurity, we've got just the job for you.

At CAPTOSEC, Inc., we are making a major contribution to reducing the shortage of cybersecurity workers in Quebec, Canada and elsewhere in the world.

Duration

42 hours

On-line

and classroom-based

In video

Self-assessment

Practical exercises and simulations

Prerequisites

IT security
37%
Network
43%
Linux
25%
Windows
25%

Objectives

Prepare participants to identify network, system and application vulnerabilities, and carry out penetration tests on these assets.

Targets and opportunities

This training course is aimed at new arrivals or students at the end of their training, with an IT profile, as well as employees wishing to change careers.
On completion of the course, you will be able to work as:

  • Cybersecurity analyst - SOC
  • Intrusion testing specialist
  • Vulnerability scanning specialist

On behalf of any organisation, including the civil service

Process and advantages

Our experts have designed the courses based on proven learning methods:

  • Classroom-based and online training
  • Practical exercises and simulations
  • Demonstrations
  • Laboratories and workshops
  • Scenarios
  • Group discussions
  • Self-evaluations

Flexible timetables to suit your needs, with the option of fast-track training over 2 or 5 days.
A fully-equipped training room (laptops, servers, video projector, etc.).

Tools and methodology

Laptop, Kali, Metasploit, Zap, Nmap, OpenVAS, Procedures, Online support.

Skills acquired

  • Steps in carrying out an intrusion and vulnerability test
  • Intrusion testing methodology
  • The different types of cyber security attack
  • Analysis of vulnerability scanning results
  • Installing and configuring Kali linux
  • Installing and configuring OpenVAS
  • Identifying and exploiting vulnerabilities
  • Drafting of test reports

Syllabus

Available after registration

Contact us

Besoin de plus d’information? Exprimez vous

en_USEN
Cookie Consent Banner by Real Cookie Banner