During this course, you will work your way through a simulated pen test for a fictitious company using a variety of tools. You will build on your existing security knowledge and experience to plan and conduct penetration tests using passive and active reconnaissance, analyse and exploit vulnerabilities, and tested applications. You will then finish up with some post-exploit tasks and analyse the results of the testing to create a report for a client.