Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
Certified Penetration Testing Consultant
Description
Certified Penetration Testing Consultant Introduction
Welcome to the Certified Penetration Testing Consultant course, a comprehensive program designed to propel your penetration testing capabilities to new heights. Throughout this training, participants will dive deep into the intricacies of testing and exploiting operating systems, equipping IT Security Professionals and IT Network Administrators with practical techniques and profound insights.
This course is tailor-made for individuals aiming to augment their expertise in penetration testing. Participants will not only enhance their proficiency in testing Windows and Linux systems but also master advanced techniques such as buffer overflow attacks while navigating through security features like DEP and ASLR.
By immersing yourself in this curriculum, you’ll learn how to effectively collaborate within a penetration testing team, streamline the exploitation process, and acquire hands-on experience crucial for success in the cybersecurity domain.
Elevate your cybersecurity career with the Certified Penetration Testing Consultant course. By mastering the art of ethical hacking and penetration testing against operating systems, you’ll be primed to tackle the challenges of leadership roles in cybersecurity, armed with the expertise and certification necessary to thrive in this dynamic field.
Prerequisites
Before enrolling in this course, participants should meet the following prerequisites:
- Completion of Mile2 C)PEH and C)PTE courses or equivalent knowledge
- Minimum of 2 years of experience in Networking Technologies
- Sound knowledge of TCP/IP
- Understanding of computer hardware
Audience
This course is tailored for a range of professionals, including:
- IS Security Officers
- Cybersecurity Managers/Administrators
- Penetration Testers
- Ethical Hackers
- Auditors
Certified Penetration Testing Consultant Exam Information
The Certified Penetration Testing Consultant exam consists of two parts:
- A hands-on penetration test that requires finding specific flags and writing a complete report.
- Online exams through Mile2’s Assessment and Certification System (“MACS”). The first exam assesses the flags found during the hands-on exam, while the second exam is a 2-hour, 100 multiple-choice questions exam that requires a passing score of 70%.
Certified Penetration Testing Consultant Outline
Outline
Module 1 – Pentesting Team Foundation
- Project Management
- Pentesting Metrics
- Team Roles, Responsibilities and Benefits
Lab Exercise – Skills Assessment
Module 2 – NMAP Automation
- NMAP Basics
- NMAP Automation
- NMAP Report Documentation
Lab Exercise – Automation Breakdown
Module 3 – Exploitation Processes
- Purpose
- Countermeasures
- Evasion
- Precision Strike
- Customized Exploitation
- Tailored Exploits
- Zero Day Angle
- Example Avenues of Attack
- Overall Objective of Exploitation
Module 4 – Fuzzing with Spike
- Vulnserver
- Spike Fuzzing Setup
- Fuzzing a TCP Application
- Custom Fuzzing Script
Lab Exercise – Fuzzing with Spike
Module 5 – Privilege Escalation
- Exploit-DB
- Immunity Debugger
- Python
- Shellcode
Lab Exercise – Let’s Crash and Callback
Module 6 – Stack Based Windows Buffer Overflow
- Debugger
- Vulnerability Research
- Control EIP, Control the Crash
- JMP ESP Instruction
- Finding the Offset
- Code Execution and Shellcode
- Does the Exploit Work?
Lab Exercise – MiniShare for the Win
Module 7 – Web Application Security and Exploitation
- Web Applications
- OWASP Top 10 – 2017
- Zap
- Scapy
Module 8 – Linux Stack Smashing
- Exploiting the Stack on Linux
Lab Exercise – Stack Overflow. Did we get root?
Module 9 – Linux Address Space Layout Randomization
- Stack Smashing to the Extreme
Lab Exercise – Defeat Me and Lookout ASLR
Module 10 – Windows Exploit Protection
- Introduction to Windows Exploit Protection
- Structured Exception Handling
- Data Execution Prevention (DEP)
- SafeSEH/SEHOP
Module 11 – Getting Around SEH and ASLR (Windows)
- Vulnerable Server Setup
- Time to Test it Out
- “Vulnserver” meets Immunity
- VulnServer Demo
Lab Exercise – Time to overwrite SEH and ASLR
Module 12 – Penetration Testing Report Writing
PreRequisites
- Mile2 C)PEH and C)PTE or equivalent knowledge
- 2 years of experience in Networking Technologies
- Sound Knowledge of TCP/IP
- Computer Hardware Knowledge
Audience
The Certified Penetration Testing Consultant course is the most advnaced training in mile2`s line of penetration testing courses and certifications. The course prepares students to consult organizations of any size on security by performing penetration test. We assume that people taking this course understand penetration testing and are looking to enhance their skills to the next level. We strongly encourage passing the C)PTE: Certified Penetration Testing Engineer Exam before taking this course or having the equivalent industry experience.
Who Should Attend:
- IS Security Officers
- Cybersecurity Managers/Administrators
- Penetration Testers
- Ethical Hackers
- Auditors
$4000.00
|
4 Days Course |