C)PTC: Certified Penetration Testing Consultant
About this Course
Instead of focusing on operating system level penetration testing, this course covers techniques on how to attack and prevent underlying network infrastructure and protocols. The training starts from basic packet capturing and analyzing by using both commercial and open source tools. From there, the student continues with Layer2 attack vectors, Layer3 based attacks; including both IPv4 and IPv6 stacks, routing protocol attacks (OSPF, BGP, etc) and then hops over to service provider level attacks related with very common used MPLS, how to use relays and pivots, VPN attacks including IPSEC protocol suite, and SSL attacks. Finally, the class will cover NIDS/NIPS evasion and implementation techniques. This course uses in-depth lab exercises after each module. Students may spend 16 hours+ performing labs that emulate a real world Pen Testing model. Students will make use of scores of traditional and cutting edge Pen Testing tools (GUI and command line, Windows and Linux) as they make their way through mile2’s time-tested methodology.
WHO SHOULD ATTEND?
- IS Security Officers
- Cyber Security Managers/Admins
- Penetration Testers
- Ethical Hackers
- Auditors
UPON COMPLETION
Upon completion, Certified Penetration Testing Consultantstudents will be able to both establish an industry acceptable pen testing processas well asbe prepared to competently take the C)PTCexam.
Available as Self-Study Ultimate Combo for $1,200.00 and includes:
• One Year Online Course Access
• Videos
• Workbook
• Lab Guide
• Cyber Range Access
• Exam Prep Guide
• Practice Quiz
• Certification Exam (2 attempts)
Course Outline
- Module 1: Pen Testing Team Formation
- Module 2: NMAP Automation
- Module3: Exploitation Process
- Module 4: Fuzzing with Spike
- Module 5: Simple Buffer Overflow
- Module 6: Stack Based Windows Buffer Overflow
- Module 7: Web Application Security and Exploitation
- Module 8: Linux Stack Smashing
- Module 9: Linux Address Space Layout Randomization
- Module 10: Windows Exploit Protection
- Module 11: Getting Around SEH and ASLR
- Module 12: Penetration Testing Report Writing
LABORATORY EXERCISES
- Lab 1:Skills Assessment
- Lab 2:Automation Breakdown
- Lab 3:Fuzzing with Spike
- Lab 4:Let’s Crash and Callback
- Lab 5:MiniShare for the Win
- Lab 6:Stack Overflow. Did we get root?
- Lab 7:Defeat Me and Lookout ASLR
- Lab 8:Time to overwrite SEH and ASLR
Sorry! It looks like we haven’t updated our dates for the class you selected yet. There’s a quick way to find out. Contact us at 502.265.3057 or email info@training4it.com
Request a Date