Home
Training information
CLT
Civil Engineering and Architecture
Networking and Communications
Management and Economics
Information Technology
Law and Legal Affairs
Tourism and Hotels
Media and Digital Blogging
Multi-Tasking Programming Tools
Training Of Trainers
Courses
All courses
Ongoing courses
News
About Us
About Us
Contact us
FAQ
Gallery
Our center
KPM
Languages Learning System
Programming Competition for Universities ICPC
ADCE
English (en)
English (en)
العربية (ar)
Login/Register
Home
Training information
CLT
Civil Engineering and Architecture
Networking and Communications
Management and Economics
Information Technology
Law and Legal Affairs
Tourism and Hotels
Media and Digital Blogging
Multi-Tasking Programming Tools
Training Of Trainers
Courses
All courses
Ongoing courses
News
About Us
About Us
Contact us
FAQ
Gallery
Our center
KPM
Languages Learning System
Programming Competition for Universities ICPC
ADCE
English (en)
English (en)
العربية (ar)
Login
×
Login to your account
Remember username
Lost password?
Log in
Log in using your account on:
Login via SAML2
Certified Penetration Testing Professional
Home
Courses
Networking and Communications
Data Security
Certified Penetration Testing Professional
Skip to main content
Course Content
Specialization: Data Security
Topic outline
General
General
General
Introduction to penetration testing and Methodologies
Introduction to penetration testing and Methodologies
Restricted
Not available unless: You are not a(n)
Guest
Introduction to penetration testing and Methodologies
Open Introduction to penetration testing and Methodologies
Penetration Tasting Scoping and Engagement
Penetration Tasting Scoping and Engagement
Restricted
Not available unless: You are not a(n)
Guest
Open Penetration Tasting Scoping and Engagement
open source intelligence (OSINT)
open source intelligence (OSINT)
Restricted
Not available unless: You are not a(n)
Guest
Open open source intelligence (OSINT)
social engineering penetration testing
social engineering penetration testing
Restricted
Not available unless: You are not a(n)
Guest
Open social engineering penetration testing
network penetration testing- external
network penetration testing- external
Restricted
Not available unless: You are not a(n)
Guest
Open network penetration testing- external
network penetration testing- internal part1
network penetration testing- internal part1
Restricted
Not available unless: You are not a(n)
Guest
Open network penetration testing- internal part1
network penetration testing- internal part2
network penetration testing- internal part2
Restricted
Not available unless: You are not a(n)
Guest
Open network penetration testing- internal part2
network penetration testing - perimeter devices
network penetration testing - perimeter devices
Restricted
Not available unless: You are not a(n)
Guest
Open network penetration testing - perimeter devices
Web application penetration testing
Web application penetration testing
Restricted
Not available unless: You are not a(n)
Guest
Open Web application penetration testing
wireless Penetration Testing
wireless Penetration Testing
Restricted
Not available unless: You are not a(n)
Guest
Open wireless Penetration Testing
IOT Penetration Testing
IOT Penetration Testing
Restricted
Not available unless: You are not a(n)
Guest
Open IOT Penetration Testing
Review
Review
Restricted
Not available unless: You are not a(n)
Guest
Open Review
Ot and scada pentest
Ot and scada pentest
Restricted
Not available unless: You are not a(n)
Guest
Open Ot and scada pentest
cloud Penetration Testing
cloud Penetration Testing
Restricted
Not available unless: You are not a(n)
Guest
Open cloud Penetration Testing
reporting
reporting
Restricted
Not available unless: You are not a(n)
Guest
Open reporting