CPTE: Certified Penetration Testing Engineer

Similar documents
CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

Module 1: Penetration Testing Planning and Scoping. Module 2: Basic Usage of Linux and its services

Course 831 Certified Ethical Hacker v9

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking

Audience. Pre-Requisites

Certified Ethical Hacker (CEH)

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

Practice Labs Ethical Hacker

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

Ethical Hacking and Prevention

Certified Vulnerability Assessor

Certified Ethical Hacker

DIS10.1 Ethical Hacking and Countermeasures

ISDP 2018 Industry Skill Development Program In association with

CEH: CERTIFIED ETHICAL HACKER v9

CPTE Certified Penetration Testing Engineer

PTE Certified Penetration Testing Engineer

Matt Walker s All in One Course for the CEH Exam. Course Outline. Matt Walker s All in One Course for the CEH Exam.

Curso: Ethical Hacking and Countermeasures

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 12 May 2018

V8 - CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 03 Feb 2018

DIS10.1:Ethical Hacking and Countermeasures

CPEH Certified Professional Ethical Hacker

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

Mobile MOUSe HACKING REVEALED ONLINE COURSE OUTLINE

CSWAE Certified Secure Web Application Engineer

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

Certified Professional Ethical Hacker

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 15 Jan

EC-Council C EH. Certified Ethical Hacker. Program Brochure

Certified Ethical Hacker V9

Certified Professional Ethical Hacker

A Model for Penetration Testing

ITSY 2330 Intrusion Detection Course Syllabus

INCIDENT HANDLING & RESPONSE PROFESSIONAL VERSION 1

CRAW Security. CRAW Security

Advanced Diploma on Information Security

ECCouncil Exam v8 Certified Ethical Hacker v8 Exam Version: 7.0 [ Total Questions: 357 ]

Certified Secure Web Application Engineer

Strategic Infrastructure Security

Principles of ICT Systems and Data Security

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

EC-Council C EH. Certified Ethical Hacker. Program Brochure

Pearson: Certified Ethical Hacker Version 9. Course Outline. Pearson: Certified Ethical Hacker Version 9.

Introduction. Competencies. This course provides guidance to help you demonstrate the following 6 competencies:

Certified Ethical Hacker Version 9. Course Outline. Certified Ethical Hacker Version Nov

Penetration Testing with Kali Linux

CertStore is a ISO (International Standard Organization) Certified and Approved by Govt. Of India.

DIS10.2. DIS10.2:Advanced Penetration Testing and Security Analyst Certification. Online Training Classroom Training Workshops Seminars

ECCouncil Exam v9 Certified Ethical Hacker Exam V9 Version: 7.0 [ Total Questions: 125 ]

Cybersecurity Foundations

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE

Ingram Micro Cyber Security Portfolio

Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems

Ethical Hacking CERTIFIED ETHICAL HACKER. Xpert Infotech is the registered trademark of Xperia Technologies Pvt. Ltd.

BraindumpsIT. BraindumpsIT - IT Certification Company provides Braindumps pdf!

CCNA Cybersecurity Operations. Program Overview

CYBERSECURITY PROFESSIONAL PENETRATION TESTER

CyberVista Certify cybervista.net

Scanning. Introduction to Hacking. Networking Concepts. Windows Hacking. Linux Hacking. Virus and Worms. Foot Printing.

CHCSS. Certified Hands-on Cyber Security Specialist (510)

Advanced Vmware Security The Lastest Threats and Tools

ECCouncil Certified Ethical Hacker. Download Full Version :

Web Application Penetration Testing

GCIH. GIAC Certified Incident Handler.

Ethical Hacking Foundation Exam Syllabus

Certified Penetration Testing Consultant

J. A. Drew Hamilton, Jr., Ph.D. Director, Center for Cyber Innovation Professor, Computer Science & Engineering

Certified Penetration Testing Engineer (CPTE)

C)PTE Certified Penetration Testing Engineer

Definitive Guide to PENETRATION TESTING

SensePost Training Overview 2011/2012

Pearson: Certified Ethical Hacker Version 9. Course Outline. Pearson: Certified Ethical Hacker Version 9.

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

C EHP Certified Ethical Hacking Professional

"Charting the Course... Certified Professional Ethical Hacker. Course Summary

Modern Day Penetration Testing Distribution Open Source Platform - Kali Linux - Study Paper

CCNA Cybersecurity Operations 1.1 Scope and Sequence

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

01/02/2014 SECURITY ASSESSMENT METHODOLOGIES SENSEPOST 2014 ALL RIGHTS RESERVED

TexSaw Penetration Te st in g

EC-Council. Program Brochure. EC-Council. Page 1

Ethical Hacking Guide 2017

CompTIA Security+ (Exam SY0-401)

DumpsTorrent. Latest dumps torrent provider, real dumps

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

2018 Cyber Mission Training Course Catalog

PRACTICAL NETWORK DEFENSE VERSION 1

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Advanced Penetration Testing The Ultimate Penetration Testing Standard

PND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access

Hands-On Hacking Course Syllabus

Certified Penetration Testing Engineer

Introduction to Ethical Hacking. General Introduction to Ethical Hacking Practitioner

Training for the cyber professionals of tomorrow

Transcription:

www.peaklearningllc.com CPTE: Certified Penetration Testing Engineer (5 Days) *Includes exam voucher, course video, an exam preparation guide About this course Certified Penetration Testing Engineer certification course is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by our international group of vulnerability consultants. The C)PTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated to working with the internet. Besides utilizing ethical hacking methodologies, be prepared to learn penetration testing using advanced persistent threat techniques. The C)PTE was developed around principles and behaviors used to combat malicious hackers and focuses on professional penetration testing rather than ethical hacking. With this in mind, the CPTE certification course is an up-grade to the EC-Council CEH! Prerequisites A minimum of 12 months experience in networking technologies Sound knowledge of TCP/IP Knowledge of Microsoft packages Network+, Microsoft, Security+ Basic Knowledge of Linux is essential Target Student: Pen Testers Ethical Hackers Network Auditors Cyber Security Professionals Vulnerability Assessors Cyber Security Course Objective Upon completion, Certified Penetration Testing Engineer students will be able to establish industry acceptable auditing standards with current best practices and policies. Students will also be prepared to competently take the C)PTE exam.

Course Outline Module 1: Business and Technical Logistics of Pen Testing Lab Getting Set Up Exercise 1 Naming and subnet assignments Exercise 2 Discovering your class share Exercise 3 VM Image Preparation Exercise 4 Discovering the Student Materials Exercise 5 PDF Penetration Testing Methodology s review Module 2: Linux Fundamentals Lab Linux Fundamentals Exercise 1 ifconfig Exercise 2 Mounting a USB Thumb Drive Exercise 3 Mount a Windows partition Exercise 4 VNC Server Exercise 5 Preinstalled tools in BackTrack 5 Module 3: Information Gathering Lab Information Gathering Exercise 1 Google Queries Exercise 2 Footprinting Tools Exercise 3 Getting everything you need with Maltego Exercise 4 Using Firefox for Pen Testing Module 4: Detecting Live Systems Module 4 Lab Detecting Live Systems Exercise 1 Look@LAN Exercise 2 Zenmap Exercise 3 Zenmap in BackTrack 5 Exercise 4 NMAP Command Line Exercise 5 Hping2 Exercise 6 Unicornscan Exercise 7 Documentation of the assigned tasks Module 5: Enumeration Lab Reconnaissance Exercise 1 Banner Grabbing Exercise 2 Zone Transfers Exercise 3 SNMP Enumeration Exercise 4 LDAP Enumeration

Exercise 5 Null Sessions Exercise 6 SMB Enumeration Exercise 7 SMTP Enumeration Exercise 8 Documentation of the assigned tasks Module 6: Vulnerability Assessments Lab Vulnerability Assessment Exercise 1 Run Nessus for Windows Exercise 2 Run Saint Exercise 3 Documentation of the assigned tasks Module 7: Malware Goes Undercover Lab Malware Exercise 1 Netcat (Basics of Backdoor Tools) Exercise 2 Exploiting and Pivoting our Attack Exercise 3 Creating a Trojan Exercise 4 Documentation of the assigned tasks Module 8: Windows Hacking Lab Windows Hacking Exercise 1 Cracking a Windows Password with Linux Exercise 2 Cracking a Windows Password with Cain Exercise 3 Covering your tracks via Audit Logs Exercise 4 Alternate Data Streams Exercise 5 Stegonagraphy Exercise 6 Understanding Rootkits Exercise 7- Windows 7 Client Side Exploit (Browser) Exercise 8- Windows 2008 SMBv2 Exploit Exercise 9 Documentation of the assigned tasks Module 9: Hacking UNIX/Linux Lab Hacking UNIX/Linux Exercise 1 Setup and Recon Do you remember how? Exercise 2 Making use of a poorly configured service Exercise 3 Cracking a Linux password Exercise 4 Creating a backdoor and covering our tracks

Module 10: Advanced Exploitation Techniques Lab Advanced Vulnerability and Exploitation Techniques Exercise 1 Metasploit Command Line Exercise 2 Metasploit Web Interface Exercise 3 Exploit-DB.com Exercise 4 Saint Exercise 5 Documentation Module 11: Pen Testing Wireless Networks Lab Attacking Wireless Networks Exercise 1 War Driving Lab Exercise 2 WEP Cracking Lab (classroom only) Exercise 3 Documentation Module 12: Networks, Sniffing and IDS Lab Networks, Sniffing and IDS Exercise 1 Capture FTP Traffic Exercise 2 ARP Cache Poisoning Basics Exercise 3 ARP Cache Poisoning - RDP Exercise 4 Documentation Module 13: Injecting the Database Lab Database Hacking Exercise 1 Hacme Bank Login Bypass Exercise 2 Hacme Bank Verbose Table Modification Exercise 3 Hacme Books Denial of Service Exercise 4 Hacme Books Data Tampering Module 14: Attacking Web Technologies Lab Hacking Web Applications Exercise 1 Input Manipulation Exercise 2 Shoveling a Shell Exercise 3 Hacme Bank Horizontal Privilege Escalation Exercise 4 Hacme Bank Vertical Privilege Escalation Exercise 5 Hacme Bank Cross Site Scripting Exercise 6 Documentation of the assigned tasks

Module 15: Project Documentation A5 Lab Cryptography Exercise 1 Caesar Encryption Exercise 2 RC4 Encryption Exercise 3 IPSec Deployment Post-Class Lab CORE IMPACT Exercise 1 CORE IMPACT