For more details email - contact@hackdefense.org

 

Advance Penetration Testing Training


 

Overview:


(CPTP) Certified Penetration Testing Professional


The CPTP certification is quickly becoming accepted worldwide as one of the most prestigious Information Security certification in the industry. Information Security Professionals holding an active CPTP certification are recognized for their expert-level knowledge and skills in hard core penetration testing.The deep technical penetration testing knowledge that a CPTP brings ensures that they are well qualified to address the most technically challenging cyber security threats and security vulnerabilities to Corporate Infrastructure.

The program continually updates and revises its testing tools and methodologies to ensure unparalleled program quality, relevance, and value. Through rigorous practical exams, the CPTP certification program sets the standard for the most advance penetration testing expertise.


Course Content:

  • Exploring Penetration Testing
  • Packet Analysis
  • Exploitation with Public Exploit Code
  • Advance Information Gathering
  • Port Scanning
  • Metasploit In Depth ( Scratch to Advance level)
  • Social Engineering Attacks
  • Network Security Assessment
  • Cracking Passwords
  • OWASP Top 10 Vulnerabilities (Exploiting Web Application)
  • Advance MITM Attacks
  • DDOS Attacks
  • Wireless(WPA2) Hacking
  • Penetration Testing Reporting


 


  • Early Registration Ends 30 days before training
  • Regular Registration Ends 1 day before training
Payment via Credit Card - Paypal

 

Duration: 2 Days


Materials Provided:

  • Penetration Testing Lab Guide
  • Complete Video's for the Course.

Who Should Attend:

  • Penetration Testers, Security Officers, Security Auditors, System Administrators, Web Security Professionals and anyone else who wants to tune their elite security skills.
  • Anyone who is interested in exploitation, vulnerabilities or Metasploit are prime candidates for this course. Students will be taught from scratch everything they need to know to complete this course successfully and walk away with a thorough knowledge and practical skills on how to perform penetration testing.
  • Managers who want to gain a more in depth understanding of how systems can be compromised, how security  controls can be bypassed both at the operating system level and network level, and the general risks associated  with your network security.

 

Prerequisites:

  • Ability to work your way around Windows. If you don't know how to "double-click" then you probably won't find your way to the course anyway.
  • Ability to work your way around Linux. Just the basic command line navigation, even if you don't know we have initial session on Exploring penetration testing environment.
  • Good understanding of TCP/IP & OSI Layer is always a plus.
  • If not don't worry. The course is structured to hold your hand.

 

What to bring:

  • A working laptop with the following hardware/software requirements:
  • Hardware Requirements
  • Hardware must be able to run a 64-bit VM If you can only get an Intel 32-bit machine you will still be able to do 85% of the labs, so don't fret. MINIMUM 2048 MB RAM required. If you can only get 1GB then you  will get by but  just slowly.
  • Wireless network card - no wired network provided
  • 20 GB free Hard disk space, USB 2.0 port to copy lab VMs
     
 

Operating Systems

  • Windows XP SP2/SP3 or Windows 7
  • it is highly recommended that students install any penetration testing distro either in Vmware or on their Hard-Disk. (Upto  them to use Live DVD)
  • If it's a company laptop with user access only, get your administrator to allow USB and install the latest version of VMWare Player
  • Ability to disable Anti-virus / Anti-spyware programs Ability to disable Windows Firewall or personal firewalls.
  • Root access mandatory
  • Ability to use an X-windows based GUI environment
  • SSH should be available
  • NOT SUPPORTED: Macs Up to you if you want to take the risk. As long as you can run VMWare machines in fusion you should be ok, but there are no guarantees and if you find you can't boot the VMs up then you  will be watching over someone else shoulder whilst they give you the evil eye.