IS
567
Cybersecurity & Pen Testing
Covers advanced computer systems security, vulnerabilities and exploits, system and network attacks, ethical hacking and penetration testing. Also addresses cyber security, cyber weapons, and advanced persistent threats along with legal and regulatory requirements for security and privacy.
Planning & scoping
Plan and scope a penetration testing engagement.
Legal & compliance requirements
Apply legal and compliance requirements to cybersecurity audits, implementations, and situations.
Tools & techniques
Use appropriate tools and techniques to perform and analyze scans and tests.
Results & remediation
Effectively communicate results and propose remediation techniques.