CYBERSECURITY PROFESSIONAL PENETRATION TESTER

Similar documents
Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

EC-Council C EH. Certified Ethical Hacker. Program Brochure

Course 831 Certified Ethical Hacker v9

EC-Council C EH. Certified Ethical Hacker. Program Brochure

CEH: CERTIFIED ETHICAL HACKER v9

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

Ethical Hacking and Prevention

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

Certified Ethical Hacker (CEH)

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking

Module 1: Penetration Testing Planning and Scoping. Module 2: Basic Usage of Linux and its services

Curso: Ethical Hacking and Countermeasures

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Advanced Diploma on Information Security

CPTE: Certified Penetration Testing Engineer

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 12 May 2018

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

V8 - CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 03 Feb 2018

Certified Ethical Hacker

Practice Labs Ethical Hacker

DIS10.1 Ethical Hacking and Countermeasures

01/02/2014 SECURITY ASSESSMENT METHODOLOGIES SENSEPOST 2014 ALL RIGHTS RESERVED

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 15 Jan

Audience. Pre-Requisites

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Certified Ethical Hacker V9

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Scanning. Introduction to Hacking. Networking Concepts. Windows Hacking. Linux Hacking. Virus and Worms. Foot Printing.

Penetration Testing with Kali Linux

Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018

Training for the cyber professionals of tomorrow

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Certified Ethical Hacker Version 9. Course Outline. Certified Ethical Hacker Version Nov

2018 Cyber Mission Training Course Catalog

CSWAE Certified Secure Web Application Engineer

Web Application Penetration Testing

ISDP 2018 Industry Skill Development Program In association with

DIS10.1:Ethical Hacking and Countermeasures

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems

SensePost Training Overview 2011/2012

Ethical Hacking. Content Outline: Session 1

Certified Secure Web Application Engineer

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Hacking Our Way to Better Security: Lessons from a Web Application Penetration Test. Tyler Rasmussen Mercer Engineer Research Center

CompTIA Cybersecurity Analyst+

ITSY 2330 Intrusion Detection Course Syllabus

Mobile MOUSe HACKING REVEALED ONLINE COURSE OUTLINE

RiskSense Attack Surface Validation for Web Applications

CIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On )

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Matt Walker s All in One Course for the CEH Exam. Course Outline. Matt Walker s All in One Course for the CEH Exam.

Certified Cyber Security Analyst VS-1160

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

Standard Course Outline IS 656 Information Systems Security and Assurance

Strategic Infrastructure Security

Hackveda Training - Ethical Hacking, Networking & Security

CyberVista Certify cybervista.net

Security+ SY0-501 Study Guide Table of Contents

Implementing Cisco Network Security (IINS) 3.0

Pearson: Certified Ethical Hacker Version 9. Course Outline. Pearson: Certified Ethical Hacker Version 9.

PND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access

CompTIA Security+ (Exam SY0-401)

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are

CRAW Security. CRAW Security

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

(CNS-301) Citrix NetScaler 11 Advance Implementation

Ethical Hacker Foundation and Security Analysts Course Semester 2

Copyright

ECCouncil Certified Ethical Hacker. Download Full Version :

Contents in Detail. Foreword by Peter Van Eeckhoutte

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Solutions Business Manager Web Application Security Assessment

Security Solutions. Overview. Business Needs

Descriptions for CIS Classes (Fall 2017)

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

PRACTICAL NETWORK DEFENSE VERSION 1

Certified Vulnerability Assessor

CHCSS. Certified Hands-on Cyber Security Specialist (510)

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

Hacking Exposed Wireless: Wireless Security Secrets & Colutions Ebooks Free

TRAINING CURRICULUM 2017 Q2

CompTIA Cybersecurity Analyst+ (CySA+) Course Outline. CompTIA Cybersecurity Analyst+ (CySA+) 17 Sep 2018

Advanced Penetration Testing The Ultimate Penetration Testing Standard

SETTING UP THE LAB 1 UNDERSTANDING BASICS OF WI-FI NETWORKS 26

Online Intensive Ethical Hacking Training

CERTIFIED ETHICAL HACKER V10 CERTIFIED ETHICAL HACKER (PRACTICAL)

OWASP TOP Release. Andy Willingham June 12, 2018 OWASP Cincinnati

Certified Penetration Testing Consultant

CCNA Cybersecurity Operations 1.1 Scope and Sequence

Software Development & Education Center Security+ Certification

Information Technology AS and Network Administration & Security AAS Proposed Changes Version 02. Network Admin & Security AAS Proposed

WHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX

Transcription:

2018 CYBERSECURITY PROFESSIONAL PENETRATION TESTER DIVERGENCE ACADEMY 11/3/2018

TABLE OF CONTENTS NETWORK EXPLOITATION AND PENTESTING... 4 WIRELESS PENTESTING AND NETWORK EXPLOITATION... 6 PYTHON FOR PENTESTERS... 8 POWERSHELL FOR PENTESTERS... 10 ETHICAL HACKING AND COUNTERMEASURES... 12 PACKET ANALYSIS WITH WIRESHARK... 13 COMPETING IN CAPTURE THE FLAG EVENTS... 14 Page 1 of 15

DIVERGENCE ACADEMY LEARNING IS BEST BY DOING Divergence Academy educates cyber security professionals in handson lab environments on topics that include computer, media and mobile device exploitation, penetration testing and vulnerability assessment, and cyber forensics. NICE National Cybersecurity Workforce Framework Our students train on the latest cyber security practices and methodologies, whether in a classroom, workplace or at home. Our courses are mapped directly to specific learning objectives from governing institutions and cyber security communities of practice, including the NICE National Cybersecurity Workforce Framework and DoD Directive 8140. WHY DIVERGENCE ACADEMY? Hands-on, Performance-Based Education Tied to Clearly- Defined and Accurate Performance Outcomes Education Developed from the Job Outward Practice and Immediate Feedback Provided Tasks Replicated through Real-World Scenarios Focus on Essentials Required Student Demonstration of Competencies and Tasks CYBERSECURITY PROFESSIONAL PENETRATION TESTER This course consists of eight modules. NETWORK PENTESTING AND EXPLOITATION ETHICAL HACKING AND COUNTERMEASURES WIRELESS PENTESTING AND EXPLOITATION POWERSHELL FOR PENTESTING PYTHON FOR PENTESTING NETWORKING AND SECURITY FOUNDATIONS PACKET ANALYSIS WITH WIRESHARK COMPETING IN CAPTURE THE FLAG EVENTS Analyze: Performs highly-specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence. Collect and Operate: Provides specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence. Investigate: Investigates cybersecurity events or crimes related to information technology (IT) systems, networks, and digital evidence. Operate and Maintain: Provides the support, administration, and maintenance necessary to ensure effective and efficient information technology (IT) system performance and security. Page 2 of 15

Divergence Academy is a premium, performance-based cyber skills training and assessment provider that quantifies a user s ability to defend a network. Leveraging the NICE framework, Divergence Academy creates the complete end-to-end experience, delivering targeted, outcome-oriented cyber security training experiences that provide users with confidence to get the job done. In a world of recognized certifications and written knowledge-based exams, our solutions stand out by providing real insight into actual onground cyber security skills, and the capability to support your knowledge base with demonstrated network defense skills. MODULES HOURS Networking and Security Foundations** 100 Network Pentesting and Exploitation 40 Wireless Pentesting and Exploitation 40 Python for Pentesting 40 PowerShell for Pentesting 40 Packet Analysis with Wireshark 40 Ethical Hacking and Countermeasures 60 Competing in Capture the Flag Events 40 NICE National Cybersecurity Workforce Framework Oversee and Govern: Provides leadership, management, direction, or development and advocacy so the organization may effectively conduct cybersecurity work. Protect and Defend: Identifies, analyzes, and mitigates threats to internal information technology (IT) systems and/or networks. Securely Provision: Conceptualizes, designs, procures, and/or builds secure information technology (IT) systems, with responsibility for aspects of system and/or network development. ** Resources are provided to prepare for networking and security certifications. Page 3 of 15

NETWORK EXPLOITATION AND PENTESTING Network Exploitation and Pentesting exposes students to all manner of reconnaissance, scanning, enumeration, exploitation and pillaging for 802.3 networks. Topics expose students to a variety of recon, discovery, scanning, enumeration, exploitation, post-exploitation, pillaging, covering one s tracks and persistence. Target Audience: Penetration testers looking to broaden their overall penetration testing skill set, network engineers, system administrators, developers. Objective: Provide in-depth exposure and hands-on practice with all facets of 802.3 hacking, vulnerability research, pivoting, exploitation, password/hash cracking, post-exploitation pillaging and methods of setting up persistence on a victim s network. Target Analysis: Topics include Linux command line, bash scripting and simple programming to enumerate, attack and exploit Linux hosts later in the course. Once Linux is complete, students begin learning basic through intermediate Windows Command Line skills, PowerShell cmdlets and the PowerShell attack framework called PowerPreter. Linux administration tools Navigation of *nix file systems Bash scripts writing for pentesting engagements Python socket program writing to connect to remote server Basic C programs in *nix environment compilation and modification Windows command line administration tools Windows file systems navigation PowerShell use for conducting enumeration and analysis of targets Nishang and PowerPreter for enumerating, attacking and deploying persistence on targets boxes Scanning and Exploiting: Students learn how to conduct basic service scans and exploit vulnerable hosts on internal networks through hands-on challenges that force them to replicate a real-world Page 4 of 15

penetration test. They learn how to map, discover and exploit web applications, which requires the tester to understand how they communicate and the role the server plays in the relationship. Students learn how to conduct reconnaissance against a web server, followed by mapping its architecture. They re also challenged with discovering vulnerabilities and misconfigurations for follow-on exploitation. o Discovering live hosts o Scanning hosts to find vulnerabilities and misconfigurations with Nmap and manual techniques o Determination of which ports are open and what services are running o Use of Metasploit to scan and database target information o Choosing the exploit and payload for target host o Use of various post-exploitation Meterpreter scripts to steal information from victim o How web applications operate How HTTP operates Headers and session management techniques Authentication and post-authentication role assignment OWASP Top 10 Web app recon, mapping, discovery and exploitation process Differentiation of URI, URL and URN Differences between server-side and client-side code Nikto for discovery of web app vulnerabilities and misconfigurations Code snippet analysis (HTML, PHP, JavaScript, JSON Arrays, AJAX, etc.) Manual SQL injection and XSS scripting attack techniques Insider Threat Simulation: Students learn how to simulate an insider threat and escape restricted environments by abusing native services and functionality. Students then move to routed attacks against clients that have NAT devices, firewalls and DMZs deployed. They learn how to exploit a variety of web-facing services and gain access to the DMZ. Once in the DMZ they are asked to pillage the hosts and find additional information to assist in pivoting deeper into the network and into network segments that don t touch the web directly. Escaping restricted Windows desktop environments Spawning unauthorized browsers for Internet access Enumerating firewalls and web-facing services with Nmap, Nikto and Dirbuster Burp Suite to proxy web application traffic to and from victim web server Page 5 of 15

Accessing demilitarized zone Pillaging hosts to find additional information Moving files onto victim boxes using Netcat and Meterpreter Stealing files from victim boxes using Netcat and Meterpreter Malicious Binaries: Students learn how to create and host malicious binaries on their own webserver to facilitate network penetration with purpose-built shellcode. Building on techniques and access gained into the DMZ, students are challenged to burrow further into the victim s network by adding routes and pivoting into internal network segments by exploiting additional victims. Having exploited a variety of hosts throughout the network deploying persistence is then taught to maintain hard earned access. Using MSFvenom to create purpose-built binaries with a variety of payloads Hosting malware on web server for easy delivery to victims Adding routes to additional network segments to facilitate pivoting Using post-exploitation Meterpreter tools to pillage various hosts Deploying Visual Basic Script for persistence on various victims Modifying persistence mechanism to survive reboot Hands-on challenges: Using all the skills, techniques and tools learned during the module to lay waste to the company s network and computers, students will be tasked with owning the CEO s computer and stealing as much sensitive information from the notional corporation as possible. The company s computers contain a wide variety of PII, corporate information and intellectual property for the taking. Can they own the CEO s box? Can they gain access to and modify the company s firewall settings? Obtaining sensitive, non-public information from the company s computer Modifying the company s firewall settings Pwning the CEO s computer WIRELESS PENTESTING AND NETWORK EXPLOITATION Wireless Pentesting and Network Exploitation introduces students to all manner of reconnaissance, scanning, enumeration, exploitation and reporting for 802.11 networks. The lab topics expose students Page 6 of 15

to a variety of survey, database creation, scripting, and attack methods that can be used to gain a foothold in to a client s network during a penetration test. Target Audience: Penetration testers looking to broaden their overall penetration testing skill set, wireless engineers, system administrators and developers Objective: Provide in-depth exposure to all facets of 802.11 penetration testing, encryption cracking, post-exploitation pillaging and report writing. Scanning: Students will learn how to conduct wireless penetration tests using open source tools against 802.11 a/b/g/n networks. In addition, students will identify characteristics and common vulnerabilities associated with WiFi. Scoping and Planning WiFi Penetration Tests 802.11 Protocols and Standards Authentication vs Association WiFi Security Solutions WiFi Hacking Hardware Connectors and Drivers Recon and Custom Password Generation with Cupp and CeWL Conducting Surveys: Students will learn to use open source tools and hardware to conduct both mobile and static 802.11 a/b/g/n surveys. Planning and executing surveys will be covered in depth as well as data management and database management techniques. Conducting Surveys Using Airodump-ng and Kismet Creating SQL Databases of Survey Data Specialized SQL and AWK Commands to Manipulate Data for Reporting Cracking WEP Setting Up MAC Filters Bypassing MAC Filters Surveys, Encryption, and Exploitation: Students continue their use of Kismet and Airodump-ng to conduct mobile surveys, database the information and create.kml files in order to visualize survey data. Students are then exposed to an in-depth discussion on advanced encryption security processes followed by learning how to use open source tools to exploit the security process. Page 7 of 15

Planning and Conducting Mobile WiFi Survey GISKimset to Database Survey Information Creating Custom SQL Queries AWK Tool to Format Output from SQL Queries for Reporting GISKismet to Create.kml Files Stream and Block Ciphers, Block Cipher Modes WPA2 AES-CCMP Security Process Cowpatty to Recover WPA2 Passphrase Pyrit to Survey and Attack Encryption Databasing and Recovering WPA2 Passphrases Man-in-middle Attacks: Building on the skills learned, the students will learn how to conduct Man-inthe-Middle attack using easy-creds and a fake access point. Students will learn how to conduct various types of attacks, traffic capture, and credential harvesting once a victim connects. Man-in-the-Middle Attack Theory Attacking Preferred Network Lists via Rogue AP Easy-Creds to set up Fake AP SSLStrip to Conduct Attack Against SSL Traffic URLSnarf to Capture Victim HTTP Traffic Ettercap to Poison ARP Cache on WiFi Network and Conduct Various Attacks Against Clients Custom Ettercap Filters Rusty Cobra Tool to Automate WiFi Survey Visualization, Database Management and Report File Creation End-to-End Exercise: This comprises a full-spectrum WiFi penetration test that the students must scope, plan and conduct. Final exercise serves to replicate a variety of network hardware, services and configurations, target website for recon, with multiple WiFi access points and clients using a variety of security mechanisms as provided. PYTHON FOR PENTESTERS Python for Pentesters module is designed for pentesters who want to use Python to build specialized tools. This challenging module will expose students to target scanning, enumeration, exploit Page 8 of 15

development, web application attacks, and persistence mechanisms through Python scripting. Upon completion, students will have built an arsenal of over 20 penetration testing tools. Target Audience: This module is designed for students who have basic programming/scripting experience in C or Python, knowledge of networking concepts, and knowledge of penetration testing methods and hacking tools Objective: Provide students with the knowledge necessary to analyze technical situations, solving them through the development of Python tools. Introduction to Building Pentest tools: Students will review Python fundamentals and will develop target scanning and enumeration tools using modules from the Python Standard Library as well as third party modules. Python Fundamentals Socket Module I/O Functionality User Input Application Banner Grabbing HTTP Methods Nmap Module Scanners: Students will begin by creating custom scanners using the Nmap module. They will develop algorithms to parse complex data sets and build additional functionality into their custom tools. Building Custom Scanners Parsing Nmap Data Exception Handling Enhancing Tool Functionality OS Module Introduction to Exploit Development Exploit Development: Students will begin by taking a deep look at x86 memory architecture, operating system controls and debugging. Students will then learn how to construct exploits against stack-based buffer overflows, as well as how to embed shellcode into their Python scripts. x86 Memory Architecture Exploit Mitigation Controls Fuzzing Page 9 of 15

Debugging Shellcode Constructing Exploits Exploit Web Application Vulnerabilities: Students will learn about common web application vulnerabilities, reconnaissance methods and attack vectors. Students will then write code to identify and exploit Standard Query Language (SQL) and Cross-Site Scripting (XSS) vulnerabilities to reveal server-side details, as well as to find directory traversal vulnerabilities. Web Application Vulnerabilities Web Application Reconnaissance HTTP Authentication SQL Vulnerabilities XSS Vulnerabilities Directory Traversal Vulnerabilities Post-Exploitation: Students will learn how to conduct post-exploitation pillaging and employ persistence techniques. They will then learn how to build reverse shells, send encoded data via HTTP requests, and control their persistence tool via command and control mechanisms. Command and Control Systems Persistence Subprocess Module Encoding and Decoding Data Data Exfiltration POWERSHELL FOR PENTESTERS PowerShell for Pentesters module provides an introduction to using PowerShell for system and application management. Through presentations, white-board discussions, and goal-based labs, this module covers various topics that are designed to take the student from just starting out with PowerShell to an intermediate level. Page 10 of 15

Target Audience: This module is targeted at IT staff with a good understanding of general systems installation, administration and troubleshooting. Previous programming and/or scripting experience is beneficial but not required. Key Features and Benefits: Lessons are organized by scenario and designed to provide students with expertise, tools and hands-on experience with Windows PowerShell version 5.0. Technical Highlights: After completing this lesson, students will be able to: Use PowerShell interactively Create scripts using the PowerShell integrated scripting environment Package code in script-based modules for simplified deployment and distribution Outline 1. Introduction: Describe the command-line shell and then introduces PowerShell and its main components and features like the ISE, workflows, desired state configuration. 2. Commands 1: PowerShell commands and their syntax are discussed along with key cmdlets. 3. Pipeline 1: Describe how multiple PowerShell commands can be used together to become a very powerful utility command. 4. Commands 2: Introduce how multiple commands can be combined in PowerShell language features like script blocks, functions, and remoting. 5. Scripts: The concept of packaging commands into script files is introduced here. Script execution, command lookup precedence and using the integrated scripting environment. 6. Help System: Managing and using the built-in help system. 7. Object Models: PowerShell as an object-based language is discussed in this module, along with the associated terminology. 8. Operators 1: The PowerShell scripting language provides the user with many operators. 9. Pipeline 2: Builds on the previous pipeline module and includes intermediate level information on using the pipeline. 10. Providers: PowerShell s support for interaction with various data sources (such as file system, Windows registry, certificate store). 11. Variables and Data Types: Builds on the previous Operators module and introduces more operators. Page 11 of 15

12. Operators 2: Different types of variables and how they are used in PowerShell. 13. Arrays: Creating, managing and using arrays to store and access information. 14. Hash Tables: Creating, managing and using hash tables. 15. Flow Control: This module introduces looping, branching and flow control statements. 16. Scopes: Concept of scopes as a protection mechanism and how to work with them. 17. Packaging & Distribution: PowerShell Modules as a code packaging and distribution method. ETHICAL HACKING AND COUNTERMEASURES Ethical hacking and countermeasures module is designed provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This module will immerse you into a Hacker Mindset to teach you how to think like a hacker and better defend against future attacks. It puts you in the driver s seat with a hands-on training environment employing a systematic ethical hacking process. You are constantly exposed to creative techniques of achieving optimal information security posture in the target organization; by hacking it! You will learn how to scan, test, hack and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks. Target Audience: This course is designed for students who are Ethical hackers, System Administrators, Network Administrators and Engineers, Auditors, Security Professionals in general. Objective: Provide students with the knowledge necessary to analyze technical situations, solving them through the development of Python tools. What will you learn? 1. Key issues plaguing the information security world, incident management process, and penetration testing. 2. Various types of footprinting, footprinting tools, and countermeasures. 3. Network scanning techniques and scanning countermeasures. 4. Enumeration techniques and enumeration countermeasures. Page 12 of 15

5. System hacking methodology, steganography, steganalysis attacks, and covering tracks. 6. Different types of Trojans, Trojan analysis, and Trojan countermeasures. 7. Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures. 8. Packet sniffing techniques and how to defend against sniffing. 9. Social Engineering techniques, identify theft, and social engineering countermeasures. 10. DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures. 11. Session hijacking techniques and countermeasures. 12. Different types of webserver attacks, attack methodology, and countermeasures. 13. Different types of web application attacks, web application hacking methodology, and countermeasures. 14. SQL injection attacks and injection detection tools. 15. Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. 16. Mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools. 17. Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures. 18. Various cloud computing concepts, threats, attacks, and security techniques and tools. 19. Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. 20. Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. 21. Perform vulnerability analysis to identify security loopholes in the target organization s network, communication infrastructure, and end systems. 22. Different threats to IoT platforms and learn how to defend IoT devices securely. PACKET ANALYSIS WITH WIRESHARK This module is for security analysts that includes 46 step-by-step labs in analyzing traffic to learn how an application works, troubleshoot slow network performance, and determine whether a machine is Page 13 of 15

infected with malware. Learning to capture and analyze communications with Wireshark will help in understanding how TCP/IP networks function. As the most popular network analyzer tool in the world, you will spend time in honing your skills with. 1. Customize Wireshark Views and Settings 2. Determine the Best Capture Method and Apply Capture Filters 3. Display Filters to Focus on Specific Traffic 4. Color and Export Interesting Packets 5. Build and Interpret Tables and Graphs 6. Reassemble Traffic for Faster Analysis 7. Add Comments to Your Trace Files and Packets 8. Use Command-Line Tools to Capture, Split, and Merge Traffic COMPETING IN CAPTURE THE FLAG EVENTS Computer security represents a challenge to education due to its interdisciplinary nature. Topics in computer security are drawn from areas ranging from theoretical aspects of computer science to applied aspects of information technology management. This makes it difficult to encapsulate the spirit of what constitutes a computer security professional. One approximation for this measure has emerged: the capture the flag competition. Attack-oriented CTF competitions try to distill the essence of many aspects of professional computer security work into a single short exercise that is objectively measurable. The focus areas that CTF competitions tend to measure are vulnerability discovery, exploit creation, toolkit creation, and operational tradecraft. A modern computer security professional should be an expert in at least one of these areas and ideally in all of them. Success in CTF competitions demands that participants be an expert in at least one and ideally all these areas. Therefore, preparing for and competing in CTF represents a way to efficiently merge discrete disciplines in computer science into a focus on computer security. Page 14 of 15

Two Capture the flag (CTF) events are interspersed in the Cybersecurity Professional Penetration Tester program. Each CTF event is no more than 20 hours in length. OUTLINE 1. Vulnerability Discovery: Auditing Source, Binaries and Webapps 2. Exploit Creation: Binary and Webapp Exploits 3. Forensics 4. Toolkits: Creation and Preparation 5. Operational Tradecraft Page 15 of 15