Certified Penetration Testing Consultant Training (CPTC)
The vendor-neutral Certified Penetration Testing Consultant Training (CPTC) course is designed for IT Security Professionals and IT Network Administrators who are interested in taking an in-depth look into specific Penetration tests and techniques against operating systems. This Certified Penetration Testing Consultant Training (CPTC) course will teach you the necessary skills to work as a penetration testing team, the exploitation process, how to create a buffer overflow against programs running on Windows and Linux while subverting features such as DEP and ASLR.
Objectives of Hands-on Laboratory Scenarios:
This is an intensive hands-on Certified Penetration Testing Consultant (CPTC) class. Students may spend 20 hours or more performing labs that walk them through a real-world Pen Testing model. Labs begin with simple activities and move on to more complex procedures. During labs, students move through a detailed Lab Guide containing screenshots, commands to be typed, and steps students should take. Students will make use of scores of traditional and cutting-edge Pen Testing tools (GUI and command line, Windows, and Linux) as they make their way through our time-tested methodology. Students can be confident that as new methods arise in the security world; our labs are updated to reflect them.
Certified Penetration Testing Consultant Exam:
The Certified Penetration Testing Consultant (CPTC) exam is a 6 hour practical in which you will be conducting both a Vulnerability Assessment and a Full Penetration Test on two IPs. You will then be given 60 days to turn in a written Penetration Test report that will be analyzed by our team of experts. You are required to find at least 80% of the vulnerabilities and then manually test to see if they are legitimate. The report will need to be professionally written, grammatically correct, and accurate. This exam is a Pass or Fail.
Accreditations & Acknowledgements
- Accredited by the NSA CNSS 4011-4016
- Mapped to NIST / Homeland Security NICCS’s Cyber Security Workforce Framework
- Approved on the FBI Cyber Security Certification Requirement list (Tier 1-3)
Exam Information:
- The Certified Penetration Testing Consultant exam is delivered online through our Assessment and Certification System (“MACS”), which is accessible on your Mile2 account. The Certified Penetration Testing Consultant (CPTC) exam will take 2 hours and consist of 100 multiple-choice questions.
Student Materials:
- Student Workbook
- Student Prep Guide
- Student Lab Guide
- CPEs: 40
Certification Exams:
- Mile2 CPTC – Certified Penetration Testing Consultant Training (CPTC)
- Covers Security+ Exam Objectives
Duration: 5 days
RESOURCES
- Certified Penetration Testing Consultant Training (CPTC) – https://www.wiley.com/
- Certified Penetration Testing Consultant Training (CPTC) – https://www.packtpub.com/
- Certified Penetration Testing Consultant Training (CPTC) – https://store.logicaloperations.com/
- Certified Penetration Testing Consultant Training (CPTC) – https://us.artechhouse.com/
- Certified Penetration Testing Consultant Training (CPTC) – https://www.amazon.com/
RELATED COURSES
- Certified Penetration Testing Engineer Training (CPTE)
- Certified Digital Forensics Examiner Training (CDFE)
- Certified Disaster Recovery Engineer Training (CDRE)
- Certified Incident Handling Engineer Training (CIHE)
- Certified Information Systems Security Officer Training (CISSO)
- Certified Network Forensics Examiner Training (CNFE)
- Certified Penetration Testing Consultant Training (CPTC)
CUSTOMIZE It
- We can adapt this Certified Penetration Testing Consultant (CPTC) course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Certified Penetration Testing Consultant (CPTC) course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Certified Penetration Testing Consultant (CPTC) Course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Certified Penetration Testing Consultant (CPTC) course in manner understandable to lay audiences.
AUDIENCE/TARGET GROUP
The target audience for this Certified Penetration Testing Consultant (CPTC) course:
- IS Security Officers
- Cyber Security Managers / Admins
- Penetration Testers
- Ethical Hackers
- Auditors
CLASS PREREQUISITES
The knowledge and skills that a learner must have before attending this Certified Penetration Testing Consultant (CPTC) course are:
- CPTE or equivalent knowledge
- A minimum of 24 months of experience in Networking Technologies
- Sound knowledge of TCP/IP
- Computer hardware knowledge
Certified Penetration Testing Consultant Training (CPTC) - OBJECTIVES
Upon completing this Certified Penetration Testing Consultant (CPTC) course, learners will be able to meet these objectives:
- Upon completion, the Certified Penetration Testing Consultant, the candidate will be able to competently take the CPTC exam.
Certified Penetration Testing Consultant Training (CPTC) - COURSE SYLLABUS
Module 1 –Pentesting Team Formation
- Section 1 –Project Management
- Section 2 –Pentesting Metrics
- Section 3 –Team Roles, Responsibilities and Benefits
- Lab Exercise –Skills Assessment
Module 2 –NMAP Automation
- Section 1–NMAP Basics
- Section 2 –NMAP Automation
- Section 3 –NMAP Report Documentation
- Lab Exercise –Automation Breakdown
Module 3 –Exploitation Process
- Section 1 –Purpose
- Section 2 –Countermeasures
- Section 3 –Evasion
- Section 4 –Precision Strike
- Section 5 –Customized Exploitation
- Section 6 –Tailored Exploits
- Section 7 –Zero-Day Angle
- Section 8 –Example Avenues of Attack
- Section 9 –Overall Objective of Exploitation
Module 4 –Fuzzing with Spike
- Section 1 –Vulnserver
- Section 2 –Spike Fuzzing Setup
- Section 3 –Fuzzing a TCP Application
- Section 4 –Custom Fuzzing Script
- Lab Exercise –Fuzzing with Spike
Module 5 –Simple Buffer Overflow
- Section 1 –Exploit-DB
- Section 2 –Immunity Debugger
- Section 3 –Python
- Section 4 -Shellcode
- Lab Exercise –Let’s Crash and Callback
Module 6 –Stack Based Windows Buffer Overflow
- Section 1 –Debugger
- Section 2 –Vulnerability Research
- Section 3 –Control EIP, Control the Crash
- Section 4 –JMP ESP Instruction
- Section 5 –Finding the Offset
- Section 6 –Code Execution and Shellcode
- Section 7 –Does the Exploit Work?
- Lab Exercise –MiniShare for the Win
Module 7 –Web Application Security and Exploitation
- Section 1 –Web Applications
- Section 2 –OWASP Top 10 -2017
- Section 3 –Zap
- Section 4 –Scapy
Module 8 –Linux Stack Smashing
- Section 1 –Exploiting the Stack on Linux
- Lab Exercise –Stack Overflow. Did we get root?
Module 9 –Linux Address Space Layout Randomization
- Section 1 –Stack Smashing to the Extreme
- Lab Exercise –Defeat Me and Lookout ASLR
Module 10 –Windows Exploit Protection
- Section 1 –Introduction to Windows Exploit Protection
- Section 2 -Structured Exception Handling
Certified Penetration Testing Consultant Training (CPTC) Course Wrap-Up
Whether you are looking for general information or have a specific question, we want to help.
Request More Information