CERTIFIED PENETRATION TESTER (CPT)

CERTIFIED PENETRATION TESTER (CPT)

Summary

Location

Location

Malaysia

Duration

Duration

5 Days
Format

Format

Public Class

Public Class

Unlocking Career Potential with Penetration Testing

If you’re ready to supercharge your career in the world of cybersecurity, look no further than the Certified Penetration Tester (CPT) course. At its core, this program delves deep into the fascinating realm of penetration testing – a critical skill in the fight against cyber threats. In a world where security breaches are a constant concern, becoming a skilled penetration tester is your ticket to making a real impact.

What is Penetration Testing?

Penetration testing, often called ethical hacking, is like putting on the shoes of a cyber attacker to strengthen your organization’s defenses. In the CPT course, you’ll learn the ins and outs of different hacker tactics, from network scanning and social engineering to web application vulnerabilities. You’ll be equipped with the tools and knowledge to identify vulnerabilities, safely exploit them, and advise on securing your organization’s network and systems.

Elevate Your Career in Cybersecurity

Imagine being the one who protects businesses from malicious hackers, ensuring their data stays safe and sound. The CPT course not only empowers you to understand and combat cyber threats but also opens doors to exciting career opportunities. Whether you’re an aspiring security professional or an IT enthusiast, this course will take your skills to the next level and position you as a key player in the ever-evolving world of cybersecurity. So, if you’re ready to unlock your career potential and be the shield against cyber threats, the CPT course is your journey to excellence.

Course Details

Course Code: CPT; Duration: 5 days; Instructor-led

  • Attendees will learn about different attacks used by hackers to hack into the organisation
  • Attendees will learn how to understand the current defense mechanisms in an environment and find gaps and make it secure.
  • Attendees will learn various types of Information / Intelligence gathering techniques, tools and its countermeasures
  • Attendees will learn various Network scanning techniques, tools and scanning countermeasures
  • Attendees will learn various Enumeration techniques, tools and enumeration countermeasures
  • Attendees will learn Packet sniffing techniques and learn on how to defend against sniffing and spoofing attacks.
  • Attendees will learn Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
  • Attendees will learn various Social Engineering techniques, tools and countermeasures
  • Attendees will learn different types of Web application vulnerabilities & attacks, web application hacking methodologies, and countermeasures
  • Attendees will learn Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools with details on how to safeguard a wireless infrastructure
  • Attendees will learn Mobile platform attack vectors, vulnerabilities and countermeasures
  • Attendees will learn various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap
  • Attendees will be able to Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
  • Attendees will be able to perform Penetration Test, Security Consultation, Security Architecture Review, Security Architecture design and provide advise to the IT Team.

Audience

This course is also recommended for security professionals who are interested in conducting vulnerability assessment and penetration test for their customers.

Prerequisites

This course will enable the network administrators, network executives and Security professionals to :

  • Understand different attacks used by hackers
  • Learn how to conduct a vulnerability assessment on the network and systems
  • Safely exploit the network and systems with the same tools used by the hackers to identify the vulnerabilities before a hacker would do
  • Learn ways to harden the network and systems thus securing the corporate network and systems.
  • Prepare and submit Vulnerability Assessment & Pentest Reports

Methodology

This program will be conducted with interactive lectures, PowerPoint presentation, discussion, and practical exercise.

Course Objectives

  • Understand different attacks used by hackers
  • Learn Various types of foot printing, foot printing tools, and countermeasures
  • Learn Network scanning techniques and scanning countermeasures
  • Learn Enumeration techniques and enumeration countermeasures
  • Learn Packet sniffing techniques and how to defend against sniffing
  • Learn Social Engineering techniques, identify theft, and social engineering countermeasures
  • Learn Different types of web application attacks, web application hacking methodology, and countermeasures
  • Learn Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools
  • Learn Mobile platform attack vectors and vulnerabilities
  • Learn Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
  • Learn Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap
  • Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.

Outlines

  • Objective: To understand the basics of attack life cycle, various attack methodologies, vulnerabilities, Vulnerability assessment and Penetration Testing.
  • Outcome: Attendees will Learn all the attack, vulnerability and Penetration Testing basics needed to be a Pentester
  • Basics: Vulnerability, Exploit, Payload, Listener, Vulnerability Assessment Vs. Penetration Testing, Types of Vulnerabilities, Vulnerability Research Sources for Penetration Testers, Exploits and tools sources for Penetration Testers, Commercial Tools for Penetration Testers, Penetration Testing Methodologies and Penetration Test Report Template
  • Objective: To understand various types of foot printing, foot printing tools, and countermeasures.
  • Outcome: Attendees will learn various types of Information / Intelligence gathering techniques, tools to Map the customer organisation / target and come up with strategy to exploit with its countermeasures
    • Passive Information Gathering with tools
    • Intelligence gathering and Map the Customer organization from Internet
    • Information intelligence and Map the infrastructure/technologies of the Target
  • Objective: To understand Network scanning techniques, Enumeration techniques and countermeasures
  • Outcome: Attendees will learn various Network scanning techniques, Enumeration techniques, Vulnerability assessments, tools and scanning countermeasures. Attendees will be able to understand the infrastructure of the target and find their vulnerabilities that can be used for exploitation.
    • Scanning Types & Scan Options
    • NMap Scanning
      • Ninja & Non-Ninja Scan types
      • Multiple IP Addresses scanning
      • Host Discovery
      • Ping & Port Scanning
      • OS Fingerprinting & Service Enumerations
      • NMap Scripts
      • Host Scanning: Bypassing Firewalls
      • Decoys
    • ZenMap
    • Netcat Fingerprinting
    • NeXpose: Vulnerability Scanning & Reporting
    • OpenVAS
  • Objective: Understand Packet sniffing techniques, tools and Countermeasures. Understand Social Engineering techniques, tool, identify theft, and countermeasures. Understand Password Cracking techniques, tools and countermeasures.
  • Outcome: Attendees will learn how to run Sniffing attacks, password Cracking with its countermeasures. Attendees will also be able to run various Social Engineering attacks and campaigns and learn how to defend from these attacks.
    • MiTM Concepts & Attacks
    • Password Cracking
      • Brute Force Tools: Hydra, Medusa
      • Crunch Password generator
      • FTP Credential cracking
      • Telnet Brute Force
      • SSH Login Brute Force Attack
      • Password cracking with John the Ripper
    • Social Engineering Attacks: Java Applet Attack Vectors, Infectious Media Generator, Credential Harvester Attack Method, Spear-Phishing Attack Method and many more
  • Objective: Understand different pentest techniques, tools. Understand how to safely exploit the vulnerabilities found in the infrastructure as proof of concept. 
  • Outcome: Attendees will learn how to exploit the vulnerabilities identified, document and prepare Report that can be presented to the Customer/ organisation.
    • Metasploit Framework Concepts
    • Metasploit Community & Armitage
    • Metasploit Exploitations: Dump Password Hash, Capture Screenshots, Capture Keystrokes, Privilege Escalation, Pivoting, ARP Scan, Stdapi and Priv, Persistence and Backdoors (Maintaining Access), Cover Tracks, Post Exploitations.
    • Anti-Virus Evasion Framework
    • Netcat Exploitations
    • Backdoor using msfvenom & Netcat
    • Advanced Exploitations using PowerShell
    • Pentest Reporting
  • Objective: Understand PowerShell basics and how PowerShell can be used to evade defenses
  • Outcome: Attendees will learn how to user PowerShell during a pentest and evade antivirus and other end point defenses.
    • PowerShell Basics
    • PowerShell Log Analysis
    • PowerShell Malwares Evading Antivirus and End Point Defenses
  • Objective: Understand different types of web application attacks, web application hacking methodologies, and countermeasures. Understand how to use the vulnerabilities and exploit them.
  • Outcome: Attendees will learn different types of Web application vulnerabilities & attacks, web application hacking methodologies, and countermeasures. Attendees will be able to perform vulnerability assessment and penetration testing on web applications.
    • Web Application Basics,
    • Web Application Fingerprinting,
    • Payment Gateway & Order Tampering,
    • Labs on OWASP TOP 10 Vulnerabilities and its sub categories using Mutillidae, DVWA [SQL Injection, Cross Site Scripting, Cross Site Request Forgery, LDAP Injection, Command Injection, Parameter/Form Tampering, Payment Gateway hacking, Improper Error Handling, Directory Traversal, Insecure storage, Information Leakage, Broken Account Management, Denial of Service, Buffer Overflow, Broken Session Management, Session Fixation, Security Misconfiguration, File Upload and Download and many more ]
    • Pentest Reporting
    • Tools Covered: Acunetix, Qualys, Burp Suite
  • Objective: Understand Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
  • Outcome: Attendees will learn how to conduct vulnerability assessment and Penetration testing on WIFI networks.
    • Introduction on WEP, WPA, WPA2
    • Wireless cracking with Reaver
    • Uncovering hidden SSIDs
    • WiFi Twining Attacks

Trainers

Reviews

Interested In

CERTIFIED PENETRATION TESTER (CPT)

Starting From
RM5500
Class Type
Private, Public

Why Us

Variety of Courses

Variety of Courses

Customizable Class

Customizable Class

Consultants Facilitate

Consultants Facilitate

HRDF Claimable

HRDF Claimable

Professional Certifications

Professional Certifications

Free Chat to Get Quote

Free Chat to Get Quote

Related Courses

Book Now

Course Name: CERTIFIED PENETRATION TESTER (CPT)
Duration: 5 Days
Class Type *
Intake Date *
First Name *
Last Name *
Email *
Contact No. *
Pax *
Total Price: RM
0.00

Enquire Now

Course Name *
Name *
Email *
Contact No. *
Enquiry For
Company Name *
Job Position *
Message *

Download Details

Name *
Email *
Contact No. *