Certified Penetration Testing Consultant – C)PTC

Pen Testing Team Formation

NMAP Automation

Exploitation Process

Skills Assessment

Request more information

We'll connect you at the earliest
Certified Penetration Testing Consultant – C)PTC
Certified Penetration Testing Consultant – C)PTC

Tools Covered in this Course

Course Details

What you’ll learn

  • Become part of a skilled team of penetration testers
  • Learn the network exploitation process
  • Understand different techniques of conducting penetration tests
  • Conduct penetration tests on web applications
  • Understand loopholes in Windows and Linux based systems
  • Protect the infrastructure against identified loopholes
  • Learn about writing and documenting the penetration tests reports

Prerequisites

A student needs to meet the following prerequisites in order to fully benefit from the course:

  • The course is an advanced level course covering more complex tools and techniques for conducting penetration tests against a network. Hence, the students are required to have a complete understanding of the pre-requisite course CPTE.
  • In addition to this, the candidates are also supposed to have a minimum of two years of practical experience in networking technologies including TCP/IP, routing protocols, and access control lists.
  • C)PTE or equivalent knowledge
  • A minimum of 24 months experience in Networking Technologies
  • Sound knowledge of TCP/IP
  • Computer hardware knowledge

Course outcome

Students who complete this course learn:

  • how to build the right penetration testing team
  • how to scan with NMAP
  • the exploitation process
  • using the fuzzing technique with a spike to help guide our proof of concept code
  • writing buffer overflows
  • understanding OWASP, Linux stack smashing
  • Windows exploit protection and getting around those protection methods
  • incident report writing

Who should attend

This course was designed for the benefit of the following organization roles:

Contents

  1. C)PTC Online Video
  2. C)PTC Electronic Book (Workbook/Lab guide)
  3. C)PTC Exam Prep Questions
  4. C)PTC Exam
  5. 2 weeks Cyber Range access  (Request login from Mile 2 when it suits you)

Student Materials:

  • Student Workbook
  • Student Lab guide
  • Exam Prep Guide

Course Outline

  • Module 1 – Pen Testing Team Formation
  • Module 2 – NMAP Automation
  • Module 3 – Exploitation Process
  • Module 4 – Fuzzing with Spike
  • Module 5 – Simple Buffer Overflow
  • Module 6 – Stack Based Windows Buffer Overflow
  • Module 7 – Web Application Security aand Exploitation
  • Module 8 – Linux Stack Smashing & Scanning
  • Module 9 – Linux Address Space Layout Randomization
  • Module 10– Windows Exploit Protection
  • Module 11 – Getting AroundSEH ASLR
  • Module 12 – Penetration Testing Report Writing

Lab Outline

  • Lab 1 – Skills Assessment
  • Lab 2 – Automation Breakdown
  • Lab 3 – Fuzzing with Spike
  • Lab 4 – Let’s Crash and Callback
  • Lab 5 – MiniShare for the Win
  • Lab 6 – Stack Overflow. Did we get root?
  • Lab 7 – Defeat Me and Lookout ASLR
  • Lab 8 – Time to overwrite SEH and ASLR

Accreditations & Acknowledgements

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS’s Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

FAQ