Certified Penetration Testing Consultant – C)PTC

Course Description

The vendor-neutral Certified Penetration Testing Consultant course is designed for IT Security Professionals and IT Network Administrators who are interested in taking an in-depth look into specific Penetration tests and techniques against operating systems. This course will teach you the necessary skills to work as a penetration testing team, the exploitation process, how to create a buffer overflow against programs running on Windows and Linux while subverting features such as DEP and ASLR.

This course teaches penetration tests and hacking techniques targeting operating systems.

Quote a Price

What you’ll learn

  • Become part of a skilled team of penetration testers
  • Learn the network exploitation process
  • Understand different techniques of conducting penetration tests
  • Conduct penetration tests on web applications
  • Understand loopholes in Windows and Linux based systems
  • Protect the infrastructure against identified loopholes
  • Learn about writing and documenting the penetration tests reports

Prerequisites

A student needs to meet the following prerequisites in order to fully benefit from the course:

  • The course is an advanced level course covering more complex tools and techniques for conducting penetration tests against a network. Hence, the students are required to have a complete understanding of the pre-requisite course CPTE.
  • In addition to this, the candidates are also supposed to have a minimum of two years of practical experience in networking technologies including TCP/IP, routing protocols, and access control lists.
  • C)PTE or equivalent knowledge
  • A minimum of 24 months experience in Networking Technologies
  • Sound knowledge of TCP/IP
  • Computer hardware knowledge

Course outcome

Students who complete this course learn:

  • how to build the right penetration testing team
  • how to scan with NMAP
  • the exploitation process
  • using the fuzzing technique with a spike to help guide our proof of concept code
  • writing buffer overflows
  • understanding OWASP, Linux stack smashing
  • Windows exploit protection and getting around those protection methods
  • incident report writing

Who should attend

This course was designed for the benefit of the following organization roles:

Contents

  1. C)PTC Online Video
  2. C)PTC Electronic Book (Workbook/Lab guide)
  3. C)PTC Exam Prep Questions
  4. C)PTC Exam
  5. 2 weeks Cyber Range access  (Request login from Mile 2 when it suits you)

Student Materials:

  • Student Workbook
  • Student Lab guide
  • Exam Prep Guide

Course Outline

  • Module 1 – Pen Testing Team Formation
  • Module 2 – NMAP Automation
  • Module 3 – Exploitation Process
  • Module 4 – Fuzzing with Spike
  • Module 5 – Simple Buffer Overflow
  • Module 6 – Stack Based Windows Buffer Overflow
  • Module 7 – Web Application Security aand Exploitation
  • Module 8 – Linux Stack Smashing & Scanning
  • Module 9 – Linux Address Space Layout Randomization
  • Module 10– Windows Exploit Protection
  • Module 11 – Getting AroundSEH ASLR
  • Module 12 – Penetration Testing Report Writing

Lab Outline

  • Lab 1 – Skills Assessment
  • Lab 2 – Automation Breakdown
  • Lab 3 – Fuzzing with Spike
  • Lab 4 – Let’s Crash and Callback
  • Lab 5 – MiniShare for the Win
  • Lab 6 – Stack Overflow. Did we get root?
  • Lab 7 – Defeat Me and Lookout ASLR
  • Lab 8 – Time to overwrite SEH and ASLR

Accreditations & Acknowledgements

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS’s Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

Course Highlights

  • Pen Testing Team Formation
  • NMAP Automation
  • Exploitation Process
  • Skills Assessment

Get Quote