Prerequisites
No technical prerequisites on client side. Access to target systems (IP, URLs) and written testing authorization required. Clear scope definition and rules of engagement.
Target Audience
- →Companies wanting to assess their security against cyberattacks
- →CIOs and CISOs preparing compliance audits (PCI DSS, SOC 2)
- →SaaS/Fintech startups with client security requirements
- →Organizations after a security incident
- →Companies before fundraising or acquisition
Expected Outcomes
Exhaustive identification of exploitable vulnerabilities
Detailed report with proof of exploitation (PoC)
Risk classification by criticality (CVSS)
Prioritized remediation recommendations
Free retest after fixes
Companies in Johannesburg using this training
- MTN Group - Awareness training for 500+ employees
- Vodacom - Ongoing certification program
- Standard Bank - Security audit and custom training
- Tshimologong Innovation Precinct startups - Monthly group training sessions
Regulatory Compliance
POPIA (Protection of Personal Information Act), King IV Corporate Governance, ISO 27001 recommended for banking sector
FAQs
What is the difference between penetration testing and vulnerability scanning?
How long does a penetration test take?
Can penetration testing disrupt our production systems?
What types of penetration tests do you offer?
Ready to get started?
Next session in Johannesburg
January 11, 2026
Pricing adapted to the Johannesburg market. Inter-company and in-house training available. Custom quote within 24h.