About the training
Penetration Testing is the authorized process of attacking a computer system to evaluate the security of the system by identifying and verifying security weaknesses and is a vital component in maintaining a strong security posture in enterprise environments. This module covers the terminology and techniques used in computer system penetration testing, where the learner will develop both theoretical knowledge of the activities of a penetration tester and the trade-craft necessary to perform penetration testing. On completion of this module, the learner will have the knowledge and skills to ethically expose potential threats in computer systems.
Penetration Testing is the authorized process of attacking a computer system to evaluate the security of the system by identifying and verifying security weaknesses and is a vital component in maintaining a strong security posture in enterprise environments. This module covers the terminology and techniques used in computer system penetration testing, where the learner will develop both theoretical knowledge of the activities of a penetration tester and the trade-craft necessary to perform penetration testing. On completion of this module, the learner will have the knowledge and skills to ethically expose potential threats in computer systems.
What you will learn
LO1 Critically evaluate and classify current and emerging vulnerabilities in computer systems.
LO2 Appraise and configure the tools and techniques used for conducting vulnerability scans to recognize vulnerabilities in computer systems.
LO3 Conduct a vulnerability assessment of a computer system and use analysis tools to categorize the vulnerabilities and potential exploits/attacks that may not
be identified using scanning techniques.
LO4 Examine the results of the vulnerability scans and analysis tools to determine insights about a computer systems threat environment and identify false
positives and highly exploitable vulnerabilities.
LO5 Critically assess and report on the results of a vulnerability assessment with the aim of evaluating an organization's preparedness against security attacks.
LO1 Critically evaluate and classify current and emerging vulnerabilities in computer systems.
LO2 Appraise and configure the tools and techniques used for conducting vulnerability scans to recognize vulnerabilities in computer systems.
LO3 Conduct a vulnerability assessment of a computer system and use analysis tools to categorize the vulnerabilities and potential exploits/attacks that may not
be identified using scanning techniques.
LO4 Examine the results of the vulnerability scans and analysis tools to determine insights about a computer systems threat environment and identify false
positives and highly exploitable vulnerabilities.
LO5 Critically assess and report on the results of a vulnerability assessment with the aim of evaluating an organization's preparedness against security attacks.
Training information
This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr George O'Mahony: GeorgeD.omahony@mtu.ie
This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr George O'Mahony: GeorgeD.omahony@mtu.ie