C)PTC: Certified Penetration Testing Consultant

The vendor-neutral Certified Penetration Testing Consultant course is designed for IT Security Professionals and IT Network Administrators who are interested in taking an in-depth look into specific Penetration tests and techniques against operating systems. This course will teach you the necessary skills to work as a penetration testing team, the exploitation process, how to create a buffer overflow against programs running on Windows and Linux while subverting features such as DEP and ASLR.

Retail Price: $3,500.00

Next Date: 06/17/2024

Course Days: 5


Enroll in Next Date

Request Custom Course


About this Course

Instead of focusing on operating system level penetration testing, this course covers techniques on how to attack and prevent underlying network infrastructure and protocols. The training starts from basic packet capturing and analyzing by using both commercial and open source tools. From there, the student continues with Layer2 attack vectors, Layer3 based attacks; including both IPv4 and IPv6 stacks, routing protocol attacks (OSPF, BGP, etc) and then hops over to service provider level attacks related with very common used MPLS, how to use relays and pivots, VPN attacks including IPSEC protocol suite, and SSL attacks. Finally, the class will cover NIDS/NIPS evasion and implementation techniques. This course uses in-depth lab exercises after each module. Students may spend 16 hours+ performing labs that emulate a real world Pen Testing model. Students will make use of scores of traditional and cutting edge Pen Testing tools (GUI and command line, Windows and Linux) as they make their way through mile2’s time-tested methodology.

 

WHO SHOULD ATTEND?

  • IS Security Officers
  • Cyber Security Managers/Admins
  • Penetration Testers
  • Ethical Hackers
  • Auditors

 

UPON COMPLETION

Upon completion, Certified Penetration Testing Consultantstudents will be able to both establish an industry acceptable pen testing processas well asbe prepared to competently take the C)PTCexam.


Course Outline

 

  • Module 1: Pen Testing Team Formation
  • Module 2: NMAP Automation
  • Module3: Exploitation Process
  • Module 4: Fuzzing with Spike
  • Module 5: Simple Buffer Overflow
  • Module 6: Stack Based Windows Buffer Overflow
  • Module 7: Web Application Security and Exploitation
  • Module 8: Linux Stack Smashing
  • Module 9: Linux Address Space Layout Randomization
  • Module 10: Windows Exploit Protection
  • Module 11: Getting Around SEH and ASLR
  • Module 12: Penetration Testing Report Writing

 

LABORATORY EXERCISES

  • Lab 1:Skills Assessment
  • Lab 2:Automation Breakdown
  • Lab 3:Fuzzing with Spike
  • Lab 4:Let’s Crash and Callback
  • Lab 5:MiniShare for the Win
  • Lab 6:Stack Overflow. Did we get root?
  • Lab 7:Defeat Me and Lookout ASLR
  • Lab 8:Time to overwrite SEH and ASLR

 

 

 

 
Course Dates Course Times (EST) Delivery Mode GTR
6/17/2024 - 6/21/2024 9:00 AM - 5:00 PM Virtual Enroll