Key issues plaguing the information security world, incident management process, and penetration testing.
Various types of foot printing, foot printing tools, and countermeasures
Different types of webserver attacks, attack methodology, and countermeasures
Different types of web application attacks, web application hacking methodology, and countermeasures.
Performing vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.