Kenya - Enquire Now +254 (0)743144753


In this course, you’ll learn valuable pen testing skills for a variety of platforms and applications, including vulnerability assessment and analysis, and planning, scoping, and managing infrastructure weaknesses.

Is this for you?

This course is designed for IT professionals seeking to learn vulnerability assessment from a broad, comprehensive perspective.

Award and Associated Qualifications

Awarded 40 CPD points upon successful completion

Start Date


Study Type

In centre, Online, or a combination

Training Type



40 hours

Request your Course Factsheet

For further information and pricing please fill in your details below and we will get back to you as soon as we can. Or, call the team on +254 (0)743144753.

    About this course

    In this course, you’ll learn valuable pen testing skills for the cloud, hybrid environments, web applications, and traditional on-premise systems. You’ll cover hands-on vulnerability assessment, scanning, and analysis, as well as planning, scoping, and managing infrastructure weaknesses.

    You’ll learn how to perform vulnerability scanning and passive / active reconnaissance. You’ll also learn about vulnerability management, as well as how to analyse the results of reconnaissance exercises.

    You’ll learn how to prepare for network attacks, wireless attacks, application-based attacks, and attacks on cloud technologies. You’ll also develop the skills needed to perform post-exploitation analysis.

    The course will also help prepare you for the CompTIA PenTest+ (PT0-002) certification exam.


    Module 1 – Scoping & Engagement

    Module 2 – Professionalism & Integrity

    Module 3 – Passive Reconnaissance

    Module 4 – Active Reconnaissance

    Module 5 – Vulnerability Scanning

    Module 6 – Network Attacks & Exploits

    Module 7 – Wireless Attacks

    Module 8 – Application-based Attacks

    Module 9 – Attacks on Cloud Technologies

    Module 10 – Attacks on Specialised Systems

    Module 11 – Social Engineering Attacks

    Module 12 – Post-exploitation Techniques

    Module 13 – Written Reports

    Module 14 – Communication & Post-Report Activities

    Module 15 – Analysing Tool & Script Output

    Module 16 – Penetration Testing Tools

    Aims and Objectives


    Finance Options

    Career Path

    Request a Course Factsheet Now!

    Simply enter your details below to receive a copy of the course details.

      Please enter your email address

      What's the difference?

      We offer a range of training packages in a range of subject areas and can offer blended learning opportunities to best meet your needs


      Our courses are practical in nature and focus on a single subject and can last anywhere from a few hours to a few days.


      Diplomas are designed to give you a complete skillset mapped to a specific career path and contain a number of core and elective courses