Specialized Capacity Building
40 hours (distributed over 8 days)
Information Security Specialists, Penetration Testers, and Technical Security Officers
Practical experience in networking and operating systems
Completion of the “Network Security and Threat Detection” program
Good knowledge of technical English

- Passive and Active Information Gathering
- Identifying Devices, Services, and Open Ports
- Using Vulnerability Scanning Tools
- Attempting to Exploit Targeted Systems
- Maintaining Access (With Consent)
- Understanding How Attackers Attempt to Hide Their Tracks
- Searching open sources (OSINT), search engines, Whois, DNS
- Using tools like Nmap, Netcat
- Maltego, Shodan, theHarvester, Recon-ng
- Identifying potential targets and vulnerabilities
- Limits of what is permitted in testing
- Nessus, OpenVAS, Qualys
- Distinguishing real vulnerabilities from false positives
- CVSS Scores (Common Vulnerability Scoring System)
- Using CVE, NVD, and Exploit-DB databases
- Which vulnerabilities require immediate remediation?
- Using Metasploit to exploit vulnerabilities
- Buffer Overflow, SQL Injection, Cross-Site Scripting
- Exploitation techniques specific to each system
- How to bypass Firewalls and IPS/IDS
- BeEF (for browser exploitation), Burp Suite (for web application testing)
- From a standard user to system administrator
- Files, passwords, and sensitive data
- Using a compromised system to attack other systems on the network
- How an attacker remains connected even after a reboot
- Removing evidence after testing (with consent)
- Executive Summary, Methodology, Findings, and Recommendations
- Vulnerability Description, Evidence, and Risk Severity
- Clear and Actionable Solutions for Each Vulnerability
- Balancing Technical Detail with Management Understanding
- Reviewing Professional Reports as Templates
- Exam structure, number of questions, duration
- List of topics covered by the exam
- References, practical exercises, virtual labs
- Exercises simulating practical exam questions
- Time management strategies, handling difficult questions
After completing all course requirements, you can apply to receive an accredited Certificate of Completion from Ru’ya Academy for Leadership and Technology.
