Personalizar as Preferências de Consentimento

Utilizamos cookies para ajudá-lo a navegar com eficácia e executar certas funções. Encontrará informações detalhadas sobre todos os cookies em cada categoria de consentimento abaixo.

Os cookies categorizados como "Necessários" são armazenados no seu navegador, pois são essenciais para ativar as funcionalidades básicas do site.... 

Sempre Ativo

Os cookies necessários são cruciais para as funções básicas do site e o site não funcionará da maneira pretendida sem eles.

Esses cookies não armazenam nenhum dado de identificação pessoal.

Sem cookies para exibir.

Os cookies funcionais ajudam a realizar certas funcionalidades, como compartilhar o conteúdo do site em plataformas de mídia social, coletar feedbacks e outros recursos de terceiros.

Sem cookies para exibir.

Cookies analíticos são usados para entender como os visitantes interagem com o site. Esses cookies ajudam a fornecer informações sobre as métricas do número de visitantes, taxa de rejeição, origem do tráfego, etc.

Sem cookies para exibir.

Os cookies de desempenho são usados para compreender e analisar os principais índices de desempenho do site, o que ajuda a oferecer uma melhor experiência do usuário aos visitantes.

Sem cookies para exibir.

Os cookies de publicidade são usados para entregar aos visitantes anúncios personalizados com base nas páginas que eles visitaram antes e analisar a eficácia da campanha publicitária.

Sem cookies para exibir.

Back

Cursos

ENISA Profiles » Penetration Tester

Value:  1700 €

Timetable:

Monday, Wendsday and Thrusday from 18:00 H to 22:00 H

Format: Online

N. Hours: 30 H

During: 4 weeks

  • Alternative Title(s)
  • Pentester
  • Ethical Hacker
  • Vulnerability Analyst
  • Cybersecurity Tester
  • Offensive Cybersecurity Expert
  • Defensive Cybersecurity Expert
  • Red Team Expert
  • Red Teamer
  • Summary Statement

Assess the effectiveness of security controls, reveals and utilise cybersecurity vulnerabilities, assessing their criticality if exploited by threat actors.

  • Mission

Plans, designs, implements and executes penetration testing activities and attack scenarios to evaluate the effectiveness of deployed or planned security measures. Identifies vulnerabilities or failures on technical and organisational controls that affect the confidentiality, integrity and availability of ICT products (e.g. systems, hardware, software and services).

  • Deliverable(s)
  • Vulnerability Assessment Results Report
  • Penetration Testing Report
  • Main Task(s)
  • Identify, analyse and assess technical and organisational cybersecurity vulnerabilities
  • Identify attack vectors, uncover and demonstrate exploitation of technical cybersecurity vulnerabilities
  • Test systems and operations compliance with regulatory standards
  • Select and develop appropriate penetration testing techniques
  • Organise test plans and procedures for penetration testing
  • Establish procedures for penetration testing result analysis and reporting
  • Document and report penetration testing results to stakeholders
  • Deploy penetration testing tools and test programs
  • Key Skill(s)
  • Develop codes, scripts and programmes
  • Perform social engineering
  • Identify and exploit vulnerabilities
  • Conduct ethical hacking
  • Think creatively and outside the box
  • Identify and solve cybersecurity-related issues
  • Communicate, present and report to relevant stakeholders
  • Use penetration testing tools effectively
  • Conduct technical analysis and reporting
  • Decompose and analyse systems to identify weaknesses and ineffective controls
  • Review codes assess their security
  • Key Knowledge
  • Cybersecurity attack procedures
  • Information technology (IT) and operational technology (OT) appliances
  • Offensive and defensive security procedures
  • Operating systems security
  • Computer networks security
  • Penetration testing procedures
  • Penetration testing standards, methodologies and frameworks
  • Penetration testing tools
  • Computer programming
  • Computer systems vulnerabilities
  • Cybersecurity recommendations and best practices
  • Cybersecurity-related certifications
  • e-Competences (from e-CF)

B.2. Component Integration (Level 4)
B.3. Testing (Level 4)
B.4. Solution Deployment (Level 2)
B.5. Documentation Production (Level 3)
E.3. Risk Management (Level 4)

Documentação

Para mais informações, contacte-nos:

    * Campo obrigatório