{"id":2398,"date":"2024-02-11T08:17:03","date_gmt":"2024-02-11T08:17:03","guid":{"rendered":"https:\/\/gsitssolutions.com\/?page_id=2398"},"modified":"2024-04-16T14:25:23","modified_gmt":"2024-04-16T14:25:23","slug":"comptia-pentest-plus-training","status":"publish","type":"page","link":"https:\/\/gsitssolutions.com\/index.php\/comptia-pentest-plus-training\/","title":{"rendered":"CompTIA Pentest+ Training"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2398\" class=\"elementor elementor-2398\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-61c5cb2 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"61c5cb2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ff95623\" data-id=\"ff95623\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8e69ca2 elementor-widget elementor-widget-hero3\" data-id=\"8e69ca2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hero3.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <!-- Start Banner \n    ============================================= -->\n    <div class=\"banner-area home2-banner-fix shadow heading-border dark bg-cover text-light\" style=\"background-image: url(https:\/\/gsitssolutions.com\/wp-content\/uploads\/2024\/01\/Cisco-Certified-Network-Associate.jpg\">\n        <div class=\"item-box\">\n            <div class=\"item\">\n                <div class=\"container\">\n                    <div class=\"row align-center\">\n                                        \n                        <div class=\"col-lg-6\">\n                            <div class=\"content\">\n                                <h4 class=\"wow fadeInUp\">PT0-002 <\/h4>\n                                <h2 class=\"wow fadeInDown\">CompTIA <strong>Pentest +<\/strong><\/h2>\n                                <p class=\"wow fadeInLeft\">\n                                    Acquire practical skills in cybersecurity through our CompTIA Pentest+ Course training, where you&#039;ll delve into the core techniques of safeguarding digital assets and mitigating cyber threats.                                <\/p>\n\n                                                                <a class=\"btn btn-light effect btn-md wow fadeInUp\" href=\"https:\/\/gsitssolutions.com\/index.php\/contact-us-gradespot-it-solutions\/\">Contact Us<\/a>\n                                                                \n                                \n                            <\/div>\n                        <\/div>\n                        <!-- Start Appoinment Form -->\n                        <div class=\"col-lg-5 offset-lg-1 appoinment\">\n                            <div class=\"appoinment-box text-center\">\n                                <div class=\"heading\">\n                                    <h4>Registration Form<\/h4>\n                                    <p>\n                                        Complete your registration by filling out the form.                                    <\/p>\n                                <\/div>\n                        \n<div class=\"wpcf7 no-js\" id=\"wpcf7-f639-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"639\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/index.php\/wp-json\/wp\/v2\/pages\/2398#wpcf7-f639-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"639\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.4\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f639-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_extcf7_conditional_options\" value=\"{&quot;form_id&quot;:639,&quot;conditions&quot;:[]}\" \/><input type=\"hidden\" name=\"_extcf7_redirect_options\" value=\"{&quot;form_id&quot;:639,&quot;redirect_options&quot;:{&quot;redirection_enable&quot;:&quot;off&quot;,&quot;custom_url_enable&quot;:&quot;off&quot;,&quot;redirect_page&quot;:&quot;&quot;,&quot;custom_urle&quot;:&quot;&quot;,&quot;redirect_new_tab&quot;:&quot;off&quot;,&quot;js_action&quot;:&quot;off&quot;,&quot;javascript_code&quot;:&quot;&quot;}}\" \/>\n<\/fieldset>\n<div class=\"row\">\n\t<div class=\"col-lg-12\">\n\t\t<div class=\"form-group\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control\" id=\"name\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Name\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"col-lg-12\">\n\t\t<div class=\"form-group\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email form-control\" id=\"email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email*\" value=\"\" type=\"email\" name=\"email\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"col-lg-12\">\n\t\t<div class=\"form-group\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"tel-36\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Mobile\" value=\"\" type=\"tel\" name=\"tel-36\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"col-lg-12\">\n\t\t<div class=\"form-group\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"select\"><select class=\"wpcf7-form-control wpcf7-select form-group\" aria-invalid=\"false\" name=\"select\"><option value=\"Select an Option\">Select an Option<\/option><option value=\"Course Training\">Course Training<\/option><option value=\"Certification Voucher\">Certification Voucher<\/option><option value=\"Other Queries\">Other Queries<\/option><\/select><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n\t<p><button type=\"submit\" name=\"submit\" id=\"submit\">Submit Query<\/button>\n\t<\/p>\n<\/div>\n<div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n                    <\/div>\n                        <\/div>\n                        <!-- End Appoinment Form -->\n\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n    <!-- End Banner -->\n\n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-9d64aa9 e-flex e-con-boxed e-con e-parent\" data-id=\"9d64aa9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12710e8 animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"12710e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">PT0-002<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21e8875 animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"21e8875\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInRight&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">CompTIA Pentest+<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afd8fd3 animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"afd8fd3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Earn industry-recognized certifications through our comprehensive CompTIA Pentest+ program, validating your expertise and opening doors to new opportunities in pentesting<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-92143d4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"92143d4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-44493a7\" data-id=\"44493a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a9037d elementor-widget elementor-widget-choose\" data-id=\"3a9037d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"choose.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <!-- Start Features \n    ============================================= -->\n    <div class=\"features-area overflow-hidden bg-gray default-padding\">\n        <!-- Fixed Shpae  -->\n        <div class=\"fixed-shape shape left bottom\">\n            <img decoding=\"async\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2022\/01\/3-1.png\" alt=\"Shape\">\n        <\/div>\n        <!-- End Fixed Shpae  -->\n        <div class=\"container\">\n            <div class=\"row align-center\">\n                <div class=\"col-lg-5 why-us\">\n                    <h5>PT0-002<\/h5>\n                    <h2>CompTIA Pentest+<\/h2>\n                    <p>\n                        Unveil the intricacies of cybersecurity with our CompTIA Pentest+ Course training. Dive deep into the realm of digital protection as you acquire practical skills to detect vulnerabilities, evaluate risks, and reinforce systems against cyber adversities. Whether you&#039;re aiming to become a cybersecurity expert or simply passionate about IT, this course empowers you with hands-on techniques and an ethical approach essential for safeguarding digital resources and excelling in the dynamic field of cybersecurity.\n\n                    <\/p>\n                                        <a class=\"popup-youtube relative theme video-play-button\" href=\"https:\/\/www.youtube.com\/watch?v=owhuBrGIOsE\" target=\"_blank\" rel=\"noopener\">\n                        <i class=\"fa fa-play\"><\/i> <span>Video Showcase<\/span>\n                    <\/a>\n                                <\/div>\n                <div class=\"col-lg-7 features-box text-center\">\n                    <div class=\"row\">\n                        \n                        <!-- Item Grid -->\n                        <div class=\"col-lg-6 col-md-6 item-grid\">\n                            <!-- Single Item -->\n                            <div class=\"item\">\n                                <i class=\"fal fa-chalkboard-teacher\"><\/i>\n                                <h5><a href=\"#\">Live Classes<\/a><\/h5>\n                                <p>\n                                     Empower your learning journey with our engaging live classes.                                <\/p>\n                            <\/div>\n                            <!-- End Single Item -->\n                            <!-- Single Item -->\n                            <div class=\"item\">\n                                <i class=\"fal fa-video\"><\/i>\n                                <h5><a href=\"#\">Recorded Videos<\/a><\/h5>\n                                <p>\n                                     Unlock a wealth of knowledge with our extensive collection of recorded videos.                                <\/p>\n                            <\/div>\n                            <!-- End Single Item -->\n                        <\/div>\n                        <!-- End Item Grid -->\n\n                        \n                        <!-- Item Grid -->\n                        <div class=\"col-lg-6 col-md-6 item-grid\">\n                            <!-- Single Item -->\n                            <div class=\"item\">\n                                <i class=\"fal fa-certificate\"><\/i>\n                                <h5><a href=\"#\">Completion Certification<\/a><\/h5>\n                                <p>\n                                     Get a course completion certification and elevate your skills for success.                                <\/p>\n                            <\/div>\n                            <!-- End Single Item -->\n                            <!-- Single Item -->\n                            <div class=\"item\">\n                                <i class=\"fal fa-hands-helping\"><\/i>\n                                <h5><a href=\"#\">Hands-On Practicals<\/a><\/h5>\n                                <p>\n                                     Immerse yourself in practical learning with our hands-on training sessions.                                <\/p>\n                            <\/div>\n                            <!-- End Single Item -->\n                        <\/div>\n                        <!-- End Item Grid -->\n\n                        \n                    <\/div>\n                <\/div>\n                \n            <\/div>\n        <\/div>\n    <\/div>\n    <!-- End Features Area -->\n       \n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-97d30f5 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"97d30f5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8408dd4\" data-id=\"8408dd4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca1f0bb elementor-widget elementor-widget-counter\" data-id=\"ca1f0bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <!-- Start Fun Factor Area\n    ============================================= -->\n    <div class=\"fun-factor-area overflow-hidden\">\n        <div class=\"container\">\n            <div class=\"fun-fact-items default-padding\">\n                <div class=\"row\">\n\n         \n        <div class=\"col-lg-3 col-md-6 item\">\n        <div class=\"fun-fact\">\n            <div class=\"icon\">\n                 <i class=\"fal fa-medal\"><\/i>\n             <\/div>\n             <div class=\"info\">\n                <div class=\"timer\" data-to=\"1200\" data-speed=\"5000\">1200<\/div>\n                <span class=\"medium\">Certified Learners<\/span>\n             <\/div>\n        <\/div>\n    <\/div>\n\n    \n        <div class=\"col-lg-3 col-md-6 item\">\n        <div class=\"fun-fact\">\n            <div class=\"icon\">\n                 <i class=\"fal fa-user-graduate\"><\/i>\n             <\/div>\n             <div class=\"info\">\n                <div class=\"timer\" data-to=\"1500\" data-speed=\"5000\">1500<\/div>\n                <span class=\"medium\">Students Enrolled<\/span>\n             <\/div>\n        <\/div>\n    <\/div>\n\n    \n        <div class=\"col-lg-3 col-md-6 item\">\n        <div class=\"fun-fact\">\n            <div class=\"icon\">\n                 <i class=\"fal fa-users\"><\/i>\n             <\/div>\n             <div class=\"info\">\n                <div class=\"timer\" data-to=\"250\" data-speed=\"5000\">250<\/div>\n                <span class=\"medium\">Interns<\/span>\n             <\/div>\n        <\/div>\n    <\/div>\n\n    \n        <div class=\"col-lg-3 col-md-6 item\">\n        <div class=\"fun-fact\">\n            <div class=\"icon\">\n                 <i class=\"fab fa-wordpress-simple\"><\/i>\n             <\/div>\n             <div class=\"info\">\n                <div class=\"timer\" data-to=\"12\" data-speed=\"5000\">12<\/div>\n                <span class=\"medium\">Web Projects<\/span>\n             <\/div>\n        <\/div>\n    <\/div>\n\n    \n    <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n    <!-- End Fun Factor Area -->\n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-87bfb14 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"87bfb14\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-15ba607\" data-id=\"15ba607\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d79b368 animated-slow elementor-widget elementor-widget-heading\" data-id=\"d79b368\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Course Overview:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee64025 animated-slow elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ee64025\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7c22368\" data-id=\"7c22368\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-62e82be elementor-widget__width-initial animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"62e82be\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>The CompTIA Pentest+ training offered by GradeSpot IT Solutions is a comprehensive program designed to provide participants with the essential skills and knowledge required for conducting penetration testing effectively. Throughout the course, students will delve into the methodologies and techniques used to identify and exploit security vulnerabilities across diverse systems and networks.<\/li><li>\u00a0<\/li><li>This Pentesting program encompasses a thorough exploration of the intricacies of penetration testing, equipping participants with the expertise needed to navigate the complexities of cybersecurity assessments. Whether it&#8217;s traditional on-premises setups or modern cloud-based environments and web applications, participants learn to systematically assess vulnerabilities across various platforms.<\/li><li>\u00a0<\/li><li>Moreover, the training program prioritizes hands-on learning experiences, ensuring that participants gain practical skills that are directly applicable to real-world scenarios. Through interactive labs, simulated exercises, and authentic case studies, students develop the proficiency required to excel in professional settings.<\/li><li>\u00a0<\/li><li>The CompTIA Pentest+ training by GradeSpot IT Solutions stands as a cornerstone for individuals seeking Penetration testing training in Hyderabad. By providing a comprehensive understanding of penetration testing methodologies and techniques, this course prepares participants to undertake VAPT training in Hyderabad confidently and contribute effectively to the cybersecurity landscape.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-75fa623 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"75fa623\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a15985b\" data-id=\"a15985b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-49fca73 animated-slow elementor-widget elementor-widget-heading\" data-id=\"49fca73\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Key Learning Objectives:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58589b6 animated-slow elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"58589b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b28c274\" data-id=\"b28c274\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e8acba elementor-widget__width-initial animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"3e8acba\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Introduction to Penetration Testing:<\/strong> Understand the fundamentals of penetration testing, including its purpose, methodology, and legal considerations.<\/li><li>\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c985a0 elementor-widget__width-initial animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"8c985a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Planning and Scoping:<\/strong> Learn how to effectively plan and scope penetration tests to ensure comprehensive coverage and adherence to client requirements.<\/li><li>\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e19df09 elementor-widget__width-initial animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"e19df09\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Reconnaissance and Information Gathering:<\/strong> Master techniques for gathering intelligence about target systems and networks, including passive and active reconnaissance methods.<\/li><li>\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e6cda86 elementor-widget__width-initial animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"e6cda86\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Vulnerability Assessment:<\/strong> Explore methodologies for identifying and assessing vulnerabilities in target systems, applications, and networks.<\/li><li>\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59df20b elementor-widget__width-initial animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"59df20b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Exploitation and Post-Exploitation:<\/strong> Gain hands-on experience in exploiting vulnerabilities to gain unauthorized access and escalate privileges, as well as post-exploitation techniques for maintaining access and covering tracks.<\/li><li>\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e349f1e elementor-widget__width-initial animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"e349f1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Reporting and Documentation:<\/strong> Learn how to effectively communicate findings and recommendations through comprehensive penetration test reports and documentation.<\/li><li>\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1ee9f2 elementor-widget__width-initial animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"b1ee9f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Tools and Techniques:<\/strong> Familiarize yourself with a wide range of penetration testing tools and techniques, including both open-source and commercial solutions.<\/li><li>\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dff8b4c elementor-widget__width-initial animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"dff8b4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Ethics and Legal Considerations:<\/strong> Understand the ethical and legal implications of penetration testing, including compliance with relevant laws and regulations.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-46d738e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"46d738e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d583dd8\" data-id=\"d583dd8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c85ceeb animated-slow elementor-widget elementor-widget-heading\" data-id=\"c85ceeb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Program Features<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da6f478 animated-slow elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"da6f478\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b216b54\" data-id=\"b216b54\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-208a489 elementor-widget__width-initial animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"208a489\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Comprehensive Curriculum:<\/strong> Covering all aspects of penetration testing, including planning and scoping, information gathering, vulnerability assessment, exploitation, post-exploitation, and reporting.<\/li><li>\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26b8836 elementor-widget__width-initial animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"26b8836\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Hands-On Labs:<\/strong> Gain practical experience through hands-on labs and real-world scenarios, allowing you to apply theoretical knowledge in a practical setting.<\/li><li>\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b03b5b6 elementor-widget__width-initial animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"b03b5b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Expert Instruction:<\/strong> Learn from industry-leading experts with years of experience in penetration testing and cybersecurity, who will guide you through the course material and provide valuable insights.<\/li><li>\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a7c061 elementor-widget__width-initial animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"9a7c061\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Exam Preparation:<\/strong> Prepare effectively for the CompTIA Pentest+ certification exam with targeted study materials, practice tests, and exam strategies.<\/li><li>\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13df127 elementor-widget__width-initial animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"13df127\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Interactive Learning:<\/strong> Engage in interactive learning experiences, including group discussions, case studies, and simulations, to enhance your understanding and retention of key concepts.<\/li><li>\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba9a926 elementor-widget__width-initial animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"ba9a926\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Flexible Learning Options:<\/strong> Choose from flexible learning options, including in-person classes, live online sessions, or self-paced study, to fit your schedule and learning preferences.<\/li><li>\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-443b0b4 elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"443b0b4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8a526b8\" data-id=\"8a526b8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-375173f animated-slow elementor-widget elementor-widget-heading\" data-id=\"375173f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Who should attend?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72f8939 animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"72f8939\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Cybersecurity Professionals<\/li><li>Network Administrators<\/li><li>IT Professionals<\/li><li>Ethical Hackers<\/li><li>Security Consultants<\/li><li>Anyone interested in a career in cybersecurity<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-78e00ee elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"78e00ee\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-969b44c\" data-id=\"969b44c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4330f75 elementor-widget__width-initial animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"4330f75\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>By the end of this course, you\u2019ll be equipped with the knowledge and skills to take on advanced roles in cybersecurity teams and be well-prepared for the CompTIA PenTest+ (PT0-002) certification exam.<\/li><li>\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec51707 elementor-widget__width-initial animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"ec51707\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Enroll in our CompTIA Pentest+ Training Program and set forth on a transformative voyage into the realm of cybersecurity. Whether your aim is to fortify defenses against cyber threats, propel your career forward, or enact change in the digital sphere, our program equips you with the essential tools, expertise, and guidance required to thrive.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6698633 elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6698633\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bf3c798\" data-id=\"bf3c798\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8cc1a2a animated-slow elementor-widget elementor-widget-heading\" data-id=\"8cc1a2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Common Job Roles for CompTIA Pentest+<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d84befd animated-slow elementor-widget elementor-widget-text-editor\" data-id=\"d84befd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Penetration Tester<\/li><li>Security Analyst<\/li><li>Web app penetration tester<\/li><li>Ethical Hacker<\/li><li>Vulnerability Assessment Analyst<\/li><li>Security Consultant<\/li><li>Security Engineer<\/li><li>Incident Responder<\/li><li>Cybersecurity Specialist<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cce50f1 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cce50f1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-81f2f2f animated-slow\" data-id=\"81f2f2f\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b99682 elementor-widget elementor-widget-image\" data-id=\"5b99682\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"543\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2024\/04\/Sample-768x543.jpg\" class=\"attachment-medium_large size-medium_large wp-image-4465\" alt=\"GradeSpot IT Solutions Certificate\" srcset=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2024\/04\/Sample-768x543.jpg 768w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2024\/04\/Sample-300x212.jpg 300w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2024\/04\/Sample-1024x724.jpg 1024w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2024\/04\/Sample-1536x1086.jpg 1536w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2024\/04\/Sample-2048x1448.jpg 2048w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2024\/04\/Sample-350x248.jpg 350w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2024\/04\/Sample-540x382.jpg 540w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2024\/04\/Sample-707x500.jpg 707w, https:\/\/gsitssolutions.com\/wp-content\/uploads\/2024\/04\/Sample-566x400.jpg 566w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-317a4fd animated-slow\" data-id=\"317a4fd\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-adc5718 elementor-widget elementor-widget-heading\" data-id=\"adc5718\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Get a Course Completion Certificate<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96c18e1 elementor-widget elementor-widget-text-editor\" data-id=\"96c18e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Show your new skills and earn a certificate. Once you have finished the training, you can sit for the exam. You will receive tasks with instructions that you will need to complete to receive the certificate<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f284c19 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"f284c19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/gsitssolutions.com\/index.php\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Enroll Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-155e911 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"155e911\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a4fedf3\" data-id=\"a4fedf3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8be25c7 elementor-widget elementor-widget-work_about\" data-id=\"8be25c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"work_about.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n        <!-- Start Works About \n    ============================================= -->\n    <div class=\"works-about-area overflow-hidden\">\n        <div class=\"container\">\n            <div class=\"works-about-items default-padding\">\n                <div class=\"row align-center\">\n                    <div class=\"col-lg-6 info\">\n                        <h5>PT0-002<\/h5>\n                        <h2>Skills To Measure In <br>CompTIA Pentest+<\/h2>\n                        <p>\n                             Earn industry-recognized certifications through our comprehensive CompTIA Pentest+ program, validating your expertise and opening doors to new opportunities in cybersecurity. Delve into the intricacies of penetration testing as you master advanced techniques to identify vulnerabilities, assess risks, and strengthen digital defenses. Whether you&#039;re looking to advance your career or enhance your cybersecurity skillset, our program provides hands-on training and practical experience to help you excel in this dynamic field.<\/p>\n                        <ul>\n                                                        <li>\n                                <h5>Planning and Scoping<\/h5>\n                            <\/li>\n                                                        <li>\n                                <h5>Information Gathering and Vulnerability Identification<\/h5>\n                            <\/li>\n                                                        <li>\n                                <h5>Attacks and Exploits<\/h5>\n                            <\/li>\n                                                        <li>\n                                <h5>Reporting and Communication<\/h5>\n                            <\/li>\n                                                        <li>\n                                <h5>Tools and Code Analysis<\/h5>\n                            <\/li>\n                                                    <\/ul>\n                                                <a href=\"https:\/\/gsitssolutions.com\/index.php\/contact-us\/\" class=\"btn btn-theme effect btn-sm\">Enroll now<\/a>\n                                             <\/div>\n                    <div class=\"col-lg-6\">\n                        <div class=\"thumb\">\n                            <img decoding=\"async\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2024\/01\/ceh-gradespot-it-solutions.jpg\" alt=\"Thumb\">\n                            <div class=\"fun-fact\">\n                                <div class=\"timer\" data-to=\"60\" data-speed=\"5000\">60<\/div>\n                                <span class=\"medium\">Hours Live Training<\/span>\n                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n    <!-- End Works About Area -->\n       \n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ji9m17z elementor-section-content-middle elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"ji9m17z\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<section class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8712de8\" data-id=\"8712de8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8f19103 elementor-widget elementor-widget-heading\" data-id=\"8f19103\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Course Curriculum<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8f902c elementor-widget elementor-widget-toggle\" data-id=\"a8f902c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1771\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1771\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Planning an Engagement<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1771\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1771\"><ul><li>\u274f Planning an Engagement<\/li><li>\u274f Risk<\/li><li>\u274f Risk Handling<\/li><li>\u274f Controls<\/li><li>\u274f PenTest Methodologies<\/li><li>\u274f PenTest Standards<\/li><li>\u274f Planning a Test<\/li><li>\u274f Legal Concepts<\/li><li>\u274f Regulatory Compliance<\/li><li>\u274f Professionalism<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1772\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1772\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Scoping an Engagement<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1772\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1772\"><ul><li>\u274f Scoping an Engagement<\/li><li>\u274f Defining the Scope<\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Adversary Emulation<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Target List<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Identifying Restrictions<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Rules of Engagement<\/span><\/li><li>\u274f Assessment Types<\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Validating the Scope<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Limitations and Permission<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Build a Virtual Lab<\/span><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1773\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1773\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Passive Reconnaissance<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1773\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1773\"><ul><li>\u274f Passive Reconnaissance<\/li><li>\u274f Information Gathering<\/li><li>\u274f O<span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">pen-Source Intelligence (OSINT)<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Social Media Scraping<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f OSINT Tools<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Using OSINT Tools<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Lab: Discovering IoT devices with Shodan<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f DNS Information<\/span><\/li><li>\u274f Lab: Exploring the Domain Tools: Nslookup, Dig, and Whois<\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Reconnaissance with CentralOps<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Public Repositories<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Search Engine Analysis<\/span><\/li><li>\u274f URL Analysis<\/li><li>\u274f Lab: Navigating Open-Source Intelligence Tools<\/li><li>\u274f Cryptographic Flaws<\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f CWE &amp; CVE<\/span><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1774\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1774\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Active Reconnaissance<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1774\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1774\"><ul><li>\u274f Active Reconnaissance<\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Scanning and Enumeration<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Conducting Enumeration<\/span><\/li><li>\u274f Other Enumeration<\/li><li>\u274f Lab: Demonstrating Enumeration Techniques<\/li><li>\u274f Website Reconnaissance<\/li><li>\u274f Detecting and Evading Defenses<\/li><li>\u274f Packet Crafting<\/li><li>\u274f Eavesdropping<\/li><li>\u274f Wardriving<\/li><li>\u274f DNS and ARP Analysis<\/li><li>\u274f Network Traffic Analysis<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1775\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1775\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Vulnerability Scanning<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1775\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1775\"><ul><li>\u274f Vulnerability Scanning<\/li><li>\u274f Vulnerability Lifecycle<\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Vulnerability Scans<\/span><\/li><li>\u274f Scanning Considerations<\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Nessus Scanning<\/span><\/li><li>\u274f OpenVas Scanning<\/li><li>\u274f Lab: Exploring OpenVAS<\/li><li>\u274f Nikto Scanning<\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Lab: Using Web Scanners<\/span><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1776\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-1776\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Nmap & Zenmap<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1776\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-1776\"><ul><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Nmap<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Nmap Discovery Scans<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Nmap Port Scans<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Nmap Fingerprinting<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Using Nmap<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f L<\/span><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">ab: Understanding Nmap Common Usage<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Nmap Scripting Engine<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Lab: Scanning a Vulnerable System<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Lab: Understanding Scan Output<\/span><\/div><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1777\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-1777\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Social Engineering and Physical Attacks<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1777\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-1777\"><ul><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Social Engineering and Physical Attacks<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Methods of Influence<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Social Engineering<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Phishing Campaigns<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Social Engineering Toolkit<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Lab: Understanding Social Engineering Toolkit (SET)<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Pretexting<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Baiting Victims<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Impersonation<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Lab: Understanding Spearphishing and Credentials Attack<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Physical Security<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Lock Picking<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Physical Attacks<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Social Engineering Tools<\/div><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1778\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-1778\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Wireless Attacks<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1778\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-1778\"><ul><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Wireless Attacks<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Wireless Security<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Bypassing MAC Filtering<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Signal Exploitation<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f WEP Hacking<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f WPA\/WPA2 Hacking<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f WPS PIN Attacks<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Lab: Monitoring with Aircrack-ng<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Evil Twins<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f On-path and Relay Attacks<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Bluetooth Attacks<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f RFID and NFC Attacks<\/div><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-1779\" class=\"elementor-tab-title\" data-tab=\"9\" role=\"button\" aria-controls=\"elementor-tab-content-1779\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Network Attacks<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1779\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"region\" aria-labelledby=\"elementor-tab-title-1779\"><ul><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Network Attacks<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Stress Testing<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Exploit Resources<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f ARP Poisoning<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f DNS Cache Poisoning<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f LLMNR\/NBT-NS Poisoning<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f MAC Spoofing<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f VLAN Hopping<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f NAC Bypass<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f On-path Attack<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Password Attacks<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Lab: Exploring Password Attacks with John the Ripper and Hydra<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Pass the Hash<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Lab: Exploring the Basics of Metasploit<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Intro to Metasploit<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Netcat<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Using Netcat<\/div><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-17710\" class=\"elementor-tab-title\" data-tab=\"10\" role=\"button\" aria-controls=\"elementor-tab-content-17710\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Application Vulnerabilities<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-17710\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"10\" role=\"region\" aria-labelledby=\"elementor-tab-title-17710\"><ul><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Application Vulnerabilities<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Race Conditions<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Buffer Overflows<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Buffer Overflow Attacks<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Authentication and References<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Improper Error Handling<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Improper Headers<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Code Signing<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f V<\/span><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">ulnerable Components<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Software Composition<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Privilege Escalation<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Conducting Privilege Escalation<\/div><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-17711\" class=\"elementor-tab-title\" data-tab=\"11\" role=\"button\" aria-controls=\"elementor-tab-content-17711\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Application Attacks<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-17711\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"11\" role=\"region\" aria-labelledby=\"elementor-tab-title-17711\"><ul><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Application Attacks<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Directory Traversals<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Dirbuster<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Cross-Site Scripting (XSS)<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Cross-Site Request Forgery (CSRF)<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\"><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f SQL Injections<\/span><\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Conducting SQL Injections<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Burp Suite and SQLmap<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Lab: Using SQL Injection<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f OWASP ZAP<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f XML Injections<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Other Injection Attacks<\/div><\/li><li><div class=\"flex w-full py-1 px-4 border-b cursor-pointer justify-between items-center relative\">\u274f Attacking Web Applications<\/div><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-17712\" class=\"elementor-tab-title\" data-tab=\"12\" role=\"button\" aria-controls=\"elementor-tab-content-17712\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Cloud Attacks<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-17712\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"12\" role=\"region\" aria-labelledby=\"elementor-tab-title-17712\"><ul><li>\u274f Cloud Attacks<\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Attacking the Cloud<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Credential Harvesting<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Misconfigured Assets<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Metadata Service Attack<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f S<\/span><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">oftware Development Kit (SDK)<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Auditing the Cloud<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Conducting Cloud Audits<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Lab: Using VSFTP Manual and Metasploit<\/span><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-17713\" class=\"elementor-tab-title\" data-tab=\"13\" role=\"button\" aria-controls=\"elementor-tab-content-17713\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Attacks on Mobile Devices<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-17713\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"13\" role=\"region\" aria-labelledby=\"elementor-tab-title-17713\"><ul><li>\u274f Attacks on Mobile Devices<\/li><li>\u274f Enterprise Mobility Management<\/li><li>\u274f Deployment Options<\/li><li>\u274f Mobile Reconnaissance Concerns<\/li><li>\u274f Mobile Device Insecurity<\/li><li>\u274f Multifactor Authentication<\/li><li>\u274f Mobile Device Attacks<\/li><li>\u274f Malware Analysis<\/li><li>\u274f Conducting Malware Analysis<\/li><li>\u274f Mobile Device Tools<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-17714\" class=\"elementor-tab-title\" data-tab=\"14\" role=\"button\" aria-controls=\"elementor-tab-content-17714\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\"> Attacks on Specialized Systems<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-17714\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"14\" role=\"region\" aria-labelledby=\"elementor-tab-title-17714\"><ul><li>\u274f Attacks on Specialized Systems<\/li><li>\u274f Internet of Things (IoT) Devices<\/li><li>\u274f Internet of Things (IoT) Vulnerabilities<\/li><li>\u274f Embedded Systems<\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f ICS and SCADA Devices<\/span><\/li><li>\u274f ICS Protocols and Vulnerabilities<\/li><li>\u274f Data Storage Vulnerabilities<\/li><li>\u274f Virtual Environments<\/li><li>\u274f Virtual Machine Attacks<\/li><li>\u274f Containerization<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-17715\" class=\"elementor-tab-title\" data-tab=\"15\" role=\"button\" aria-controls=\"elementor-tab-content-17715\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Post-exploitation Exploits<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-17715\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"15\" role=\"region\" aria-labelledby=\"elementor-tab-title-17715\"><ul><li>\u274f Post-exploitation<\/li><li>\u274f Enumerating the Network<\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Network Segmentation Testing<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f L<\/span><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">ateral Movement and Pivoting<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f P<\/span><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">ass the Hash<\/span><\/li><li>\u274f Golden Ticket<\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f <\/span><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">Lateral Movement<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Pivoting<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Escalating Privileges<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Upgrading Restrictive Shells<\/span><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-17716\" class=\"elementor-tab-title\" data-tab=\"16\" role=\"button\" aria-controls=\"elementor-tab-content-17716\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Detection Avoidance<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-17716\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"16\" role=\"region\" aria-labelledby=\"elementor-tab-title-17716\"><ul><li>\u274f Detection Avoidance<\/li><li>\u274f Trojans and Backdoors<\/li><li>\u274f Creating Persistence<\/li><li>\u274f Lab: Using Reverse and Bind Shells<\/li><li>\u274f Living Off the Land<\/li><li>\u274f Data Exfiltration<\/li><li>\u274f Covert Channels<\/li><li>\u274f Steganography<\/li><li>\u274f Lab: Navigating Steganography Tools<\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Covering Your Tracks<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Persistence and Covering Your Tracks<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Post-Exploitation Tools<\/span><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-17717\" class=\"elementor-tab-title\" data-tab=\"17\" role=\"button\" aria-controls=\"elementor-tab-content-17717\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Communication and Reports<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-17717\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"17\" role=\"region\" aria-labelledby=\"elementor-tab-title-17717\"><ul><li>\u274f Communication and Reports<\/li><li>\u274f Communication Paths<\/li><li>\u274f Communication Triggers<\/li><li>\u274f Reasons for Communication<\/li><li>\u274f Presentation of Findings<\/li><li>\u274f Report Data Gathering<\/li><li>\u274f Written Reports<\/li><li>\u274f Common Themes<\/li><li>\u274f Securing and Storing Reports<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-17718\" class=\"elementor-tab-title\" data-tab=\"18\" role=\"button\" aria-controls=\"elementor-tab-content-17718\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Findings and Remediations<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-17718\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"18\" role=\"region\" aria-labelledby=\"elementor-tab-title-17718\"><ul><li>\u274f Findings and Remediations<\/li><li>\u274f Security Control Categories<\/li><li>\u274f Selecting Security Controls<\/li><li>\u274f Physical Controls<\/li><li>\u274f Operational Controls<\/li><li>\u274f Administrative Controls<\/li><li>\u274f System Hardening<\/li><li>\u274f Secure Coding<\/li><li>\u274f Implementing MFA<\/li><li>\u274f Digital Certificates<\/li><li>\u274f Other Technical Controls<\/li><li>\u274f Mitigation Strategies<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-17719\" class=\"elementor-tab-title\" data-tab=\"19\" role=\"button\" aria-controls=\"elementor-tab-content-17719\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Post-report Activities<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-17719\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"19\" role=\"region\" aria-labelledby=\"elementor-tab-title-17719\"><ul><li>\u274f Post-report Activities<\/li><li>\u274f Remove Shells and Tools<\/li><li>\u274f Delete Test Credentials<\/li><li>\u274f Destroy Test Data<\/li><li>\u274f Client Acceptance<\/li><li>\u274f Attestation of Findings<\/li><li>\u274f Lessons Learned<\/li><li>\u274f Retesting<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-17720\" class=\"elementor-tab-title\" data-tab=\"20\" role=\"button\" aria-controls=\"elementor-tab-content-17720\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Scripting Basics<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-17720\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"20\" role=\"region\" aria-labelledby=\"elementor-tab-title-17720\"><ul><li>\u274f Scripting Basics<\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Shells and Programming Languages<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Variables<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Loops<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Logic Control<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Data Structures<\/span><\/li><li><span class=\"text-left text-[#000] md:w-1\/2 w-[30%] font-normal text-sm\">\u274f Object Oriented Programming<\/span><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-17721\" class=\"elementor-tab-title\" data-tab=\"21\" role=\"button\" aria-controls=\"elementor-tab-content-17721\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Analyzing Scripts<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-17721\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"21\" role=\"region\" aria-labelledby=\"elementor-tab-title-17721\"><ul><li>\u274f Analyzing Scripts<\/li><li>\u274f Coding in Bash<\/li><li>\u274f Bash Example<\/li><li>\u274f Coding in PowerShell<\/li><li>\u274f PowerShell Example<\/li><li>\u274f Coding in Python<\/li><li>\u274f Python Example<\/li><li>\u274f Coding in Perl<\/li><li>\u274f Perl Example<\/li><li>\u274f Coding in JavaScript<\/li><li>\u274f JavaScript Example<\/li><li>\u274f Coding in Ruby<\/li><li>\u274f Ruby Example<\/li><li>\u274f Lab: Exploring Programming Shells<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-17722\" class=\"elementor-tab-title\" data-tab=\"22\" role=\"button\" aria-controls=\"elementor-tab-content-17722\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Exploits and Automation<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-17722\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"22\" role=\"region\" aria-labelledby=\"elementor-tab-title-17722\"><ul><li>\u274f Exploits and Automation<\/li><li>\u274f Exploits to Download Files<\/li><li>\u274f Exploits for Remote Access<\/li><li>\u274f Exploits for Enumerating Users<\/li><li>\u274f Exploits for Enumerating Assets<\/li><li>\u274f Lab: Analyzing Exploit Code<\/li><li>\u274f Automation in Engagements<\/li><li>\u274f Automation with Nmap Scripts<\/li><li>\u274f Lab: Applying PenTest Automation<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-17723\" class=\"elementor-tab-title\" data-tab=\"23\" role=\"button\" aria-controls=\"elementor-tab-content-17723\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Tool Round-up<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-17723\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"23\" role=\"region\" aria-labelledby=\"elementor-tab-title-17723\"><ul><li>\u274f Tool Round-up<\/li><li>\u274f OSINT Tools<\/li><li>\u274f Scanning Tools<\/li><li>\u274f Networking Tools<\/li><li>\u274f Wireless Tools<\/li><li>\u274f Social Engineering Tools<\/li><li>\u274f Remote Access Tools<\/li><li>\u274f Credential Testing Tools<\/li><li>\u274f Web Application Tools<\/li><li>\u274f Cloud Tools<\/li><li>\u274f Steganography Tools<\/li><li>\u274f Debuggers<\/li><li>\u274f Miscellaneous Tools<\/li><li>\u274f Lab: Understanding Spear Phishing and Credentials Attack<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-7ad24dd e-flex e-con-boxed e-con e-parent\" data-id=\"7ad24dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9919571 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"9919571\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-download\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M216 0h80c13.3 0 24 10.7 24 24v168h87.7c17.8 0 26.7 21.5 14.1 34.1L269.7 378.3c-7.5 7.5-19.8 7.5-27.3 0L90.1 226.1c-12.6-12.6-3.7-34.1 14.1-34.1H192V24c0-13.3 10.7-24 24-24zm296 376v112c0 13.3-10.7 24-24 24H24c-13.3 0-24-10.7-24-24V376c0-13.3 10.7-24 24-24h146.7l49 49c20.1 20.1 52.5 20.1 72.6 0l49-49H488c13.3 0 24 10.7 24 24zm-124 88c0-11-9-20-20-20s-20 9-20 20 9 20 20 20 20-9 20-20zm64 0c0-11-9-20-20-20s-20 9-20 20 9 20 20 20 20-9 20-20z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download Curriculum<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-19c38eb e-flex e-con-boxed e-con e-parent\" data-id=\"19c38eb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-824f28d elementor-widget elementor-widget-spacer\" data-id=\"824f28d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7afea36 elementor-section-content-middle animated-slow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7afea36\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-29121ac\" data-id=\"29121ac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-047fd0a elementor-widget elementor-widget-text-editor\" data-id=\"047fd0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOur Clients\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6084629 elementor-widget elementor-widget-heading\" data-id=\"6084629\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Students works for.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1aa0a6f elementor-widget elementor-widget-text-editor\" data-id=\"1aa0a6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our students have been employed by some of the top companies in the industry.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a86e69a\" data-id=\"a86e69a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b102a80 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b102a80\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-420a38b\" data-id=\"420a38b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-90422cc elementor-widget elementor-widget-image\" data-id=\"90422cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2024\/01\/astreya-logo.png\" class=\"elementor-animation-grow attachment-full size-full wp-image-1805\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-9eb8149\" data-id=\"9eb8149\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-784dd0e elementor-widget elementor-widget-image\" data-id=\"784dd0e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2024\/01\/movate-logo.png\" class=\"elementor-animation-grow attachment-full size-full wp-image-1806\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-68604f1\" data-id=\"68604f1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7faf36d elementor-widget elementor-widget-image\" data-id=\"7faf36d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2024\/01\/purpletalk-logo.png\" class=\"elementor-animation-grow attachment-full size-full wp-image-1807\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bff2035 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bff2035\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-d3b8e62\" data-id=\"d3b8e62\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1a1e94e elementor-widget elementor-widget-image\" data-id=\"1a1e94e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2024\/01\/3iInfotech.jpg\" class=\"elementor-animation-grow attachment-full size-full wp-image-1808\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-444d771\" data-id=\"444d771\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fe96774 elementor-widget elementor-widget-image\" data-id=\"fe96774\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2024\/01\/virinchi-technologies-logo.png\" class=\"elementor-animation-grow attachment-full size-full wp-image-1809\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-05a1cb7\" data-id=\"05a1cb7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dcad7c4 elementor-widget elementor-widget-image\" data-id=\"dcad7c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"96\" src=\"https:\/\/gsitssolutions.com\/wp-content\/uploads\/2024\/01\/vijaya-diagnostics-logo.png\" class=\"elementor-animation-grow attachment-full size-full wp-image-1810\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-eb95ee8 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"eb95ee8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-986f1be\" data-id=\"986f1be\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-60aae42 elementor-widget elementor-widget-faq\" data-id=\"60aae42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"faq.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <!-- Start Faq \n    ============================================= -->\n    <div class=\"faq-area default-padding bg-gray\">\n        <div class=\"container\">\n            <div class=\"faq-items\">\n                <div class=\"row\">\n\n                    <div class=\"col-lg-5 info\">\n                        <h5>faq<\/h5>\n                        <h2>Most common questions about our services<\/h2>\n                        <a href=\"https:\/\/gsitssolutions.com\/index.php\/faq\/\" class=\"btn btn-theme effect btn-md\">View All<\/a>\n                    <\/div>\n\n                    <div class=\"col-lg-7\">\n                        <div class=\"faq-content\">\n                            <div class=\"accordion\" id=\"accordionExample\">\n                                            <div class=\"card\">\n                    <div class=\"card-header\" id=\"headingOne\">\n                        <h4 class=\"mb-0\" data-toggle=\"collapse\" data-target=\"#collapseOne\" aria-expanded=\"true\" aria-controls=\"collapseOne\">\n                            What training programs do you offer?                        <\/h4>\n                    <\/div>\n\n                    <div id=\"collapseOne\" class=\"collapse show\" aria-labelledby=\"headingOne\" data-parent=\"#accordionExample\">\n                        <div class=\"card-body\">\n                            <p>\n                                Our organization offers an array of professional training programs for both corporates and students. With our courses ranging from computer hardware, networking, cybersecurity, cloud computing, digital marketing, data science, and many more, we are dedicated to providing comprehensive and up-to-date expertise in various IT technologies. Our approach to training is geared towards providing practical skills and knowledge that will equip our clients to succeed in their respective fields. We pride ourselves on our commitment to maintaining a high standard of quality in all our training sessions, and our team of expert instructors are fully equipped to offer individualized attention and support to all our clients.                            <\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n                        <div class=\"card\">\n                    <div class=\"card-header\" id=\"headingTwo\">\n                        <h4 class=\"mb-0\" data-toggle=\"collapse\" data-target=\"#collapseTwo\" aria-expanded=\"true\" aria-controls=\"collapseTwo\">\n                            What services do you offer?                        <\/h4>\n                    <\/div>\n\n                    <div id=\"collapseTwo\" class=\"collapse \" aria-labelledby=\"headingTwo\" data-parent=\"#accordionExample\">\n                        <div class=\"card-body\">\n                            <p>\n                                Our company offers an extensive range of professional services that cater to diverse industry and business needs. These services include top-quality IT trainings, expert web development, robust cybersecurity solutions, innovative digital marketing strategies, efficient network infrastructure building, creative logo designing, and many more. Our team of experienced professionals prides itself on delivering comprehensive solutions tailored to your unique requirements. We ensure that each service we provide adheres to the highest industry standards and is designed to enhance your business operations and strengthen your brand.                            <\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n                        <div class=\"card\">\n                    <div class=\"card-header\" id=\"headingThree\">\n                        <h4 class=\"mb-0\" data-toggle=\"collapse\" data-target=\"#collapseThree\" aria-expanded=\"true\" aria-controls=\"collapseThree\">\n                            What&#039;s the best way to get in touch with your team?                        <\/h4>\n                    <\/div>\n\n                    <div id=\"collapseThree\" class=\"collapse \" aria-labelledby=\"headingThree\" data-parent=\"#accordionExample\">\n                        <div class=\"card-body\">\n                            <p>\n                                To get in touch with us, we offer multiple channels of communication. You may reach us by phone at +91 91826 54056, or by email at info@gsitssolutions.com for any inquiries you may have. Additionally, you are more than welcome to visit us at our office located at 16-126, 2nd Floor, Near Sai Baba Temple, Road No.1, Sri Krishna Nagar, Dilsukhnagar, Hyderabad, Telangana - 500060. We are dedicated to providing exceptional service to our clients and we look forward to hearing from you.                            <\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n        \n                      <\/div>\n                        <\/div>\n                    <\/div>\n\n                <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n    <!-- End Faq Area -->\n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>PT0-002 CompTIA Pentest + Acquire practical skills in cybersecurity through our CompTIA Pentest+ Course training, where you&#039;ll delve into the core techniques of safeguarding digital assets and mitigating cyber threats. Contact Us Registration Form Complete your registration by filling out the form. Select an OptionCourse TrainingCertification VoucherOther Queries Submit Query PT0-002 CompTIA Pentest+ Earn industry-recognized [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/home1.php","meta":{"_eb_attr":"","footnotes":""},"class_list":["post-2398","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/pages\/2398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/comments?post=2398"}],"version-history":[{"count":131,"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/pages\/2398\/revisions"}],"predecessor-version":[{"id":5062,"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/pages\/2398\/revisions\/5062"}],"wp:attachment":[{"href":"https:\/\/gsitssolutions.com\/index.php\/wp-json\/wp\/v2\/media?parent=2398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}