Program on Infrastructure Penetration Testing
Unit 1: Confidentiality Integrity and privacy - availability - access control - access control techniques - authorization -authentication tokens - Key Management - Kerberos - Hashes - APIs - API Gateway - API Life cycle management -API documentation standards - API management patterns - API security patterns - API authentication - protection against cyber threats
Unit 2: Vulnerability Management - Vulnerability Framework - The Vulnerability Creation Process - General Architecture - Charter Development - Business Case - Asset Valuation Guide - VM Policies - Deployment Strategies - Basic Strategy - Risk-Based Strategy - Controlling Internal Vulnerabilities - Principles of Mitigation - vulnerability assessment - Nessus - NMAP - Pen testing - Tools.
Unit 3: Standards - Common Vulnerabilities and Exposure, Common Vulnerability Scoring System, - National Vulnerability Database (NVD) - Common Platform Enumeration - Security Content Automation Protocol - Trusted Automated exchange of indicator information - OWASP Application security verification standard - Payment Card Industry - PCI compliance - HIPAA - HIPAA compliance
Unit 4: Discovery Reports - Scheduling - Evaluation Reports - Profile Reports -Audit Reports -Audit Trend Analysis -Vulnerability Trend Report -Network Risk Trend Report - Compliance reports
Unit 5: IT Systems - System components - ITIL / ITSM process- Components/Elements of a Service - Service definition - configuration management - Infrastructure as code - versions - patch management - tools like Ansible - Chef - IT Service catalog - Self service - Request management - Incident management - knowledge management - problem management - Service level agreement management - Vendor management - Change management.