C)PTE (Certified Penetration Testing Engineer)

Security/Informatie Beveiliging trainingen

> Security

Beschikbare leervormen - Available learning methods C)PTE training
classroom-study
   
 
 
 
 
 
Course duration                 Course price                   Corresponding exam
5 days   EUR 2.995,00 excl. BTW/VAT   C)PTE – Certified Pen Testing Engineer™ (taken through mile2’s MACS online testing system)

Course Overview

C)PTE’s foundation is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by our international group of vulnerability consultants. Mile2 trainers keep abreast of their field by practicing what they teach; we believe that an equal emphasis on theoretical and real world experience is essential for effective knowledge transfer to you, the student.

The C)PTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques.

This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk.

Mile2 goes far beyond simply teaching you to “Hack” - be prepared to learn penetration testing using advanced persistent threat techniques along with the highest level ethical hacking methodologies.

Our course was developed around principles and behaviors used by malicious hackers. The course is taught with this in mind while keeping the focus on professional penetration testing and ensuring the security of information assets.

Course Benefits

Certified Penetration Testing Engineer graduates obtain real world security knowledge that will enable them to recognize vulnerabilities, exploit system weaknesses, and help safeguard threats. Graduates will learn the art of Ethical Hacking with a professional edge (Penetration Testing).

Experience Level:
-
Geen data hier?:
Vraag een sessie aan via info@one2train.nl

Prerequisites

  • A minimum of 12 months experience in networking technologies
  • Sound knowledge of TCP/IP
  • Knowledge of Microsoft packages
  • Network+, Microsoft, Security+
  • Basic Knowledge of Linux is essential

Certification Exam (included)

C)PTE – Certified Pen Testing Engineer™ (taken through mile2’s MACS online testing system)

Certification Track:

Certified Pen Testing EngineerCertified Pen Testing ConsultantCertified Digital Forensics Examiner

Course Details

Module 0: Course Overview

Module 1: Business and Technical Logistics of Pen Testing

Module 2: Linux Fundamentals

Module 3: Information Gathering

Module 4: Detecting Live Systems

Module 5: Enumeration

Module 6: Vulnerability Assessments

Module 7: Malware Goes Undercover

Module 8: Windows Hacking

Module 9: Hacking UNIX/Linux

Module 10: Advanced Exploitation Techniques

Module 11: Pen Testing Wireless Networks

Module 12: Networks, Sniffing and IDS

Module 13: Injecting the Database

Module 14: Attacking Web Technologies

Module 15: Project Documentation

DETAILED HANDS-ON LABORATORY OUTLINE

Module 1 Lab – Getting Set Up

Exercise 1 – Naming and subnet assignments
Exercise 2 – Discovering your class share
Exercise 3 – VM Image Preparation

Exercise 4 – Discovering the Student Materials

Exercise 5 – PDF Penetration Testing Methodology’s review

Module 2 Lab – Linux Fundamentals

Exercise 1 – ifconfig

Exercise 2 – Mounting a USB Thumb Drive

Exercise 3 – Mount a Windows partition

Exercise 4 – VNC Server

Exercise 5 – Preinstalled tools in BackTrack 5

Module 3 Lab – Information Gathering

Exercise 1 – Google Queries

Exercise 2 – Footprinting Tools

Exercise 3 – Getting everything you need with Maltego
Exercise 4 – Using Firefox for Pen Testing

Exercise 5 – Documentation of the assigned tasks

Module 4 Lab – Detecting Live Systems

Exercise 1 – Look@LAN>

Exercise 2 – Zenmap

Exercise 3 – Zenmap in BackTrack 5

Exercise 4 – NMAP Command Line

Exercise 5 – Hping2

Exercise 6 – Unicornscan

Exercise 7 – Documentation of the assigned tasks

Module 5 Lab – Reconnaissance

Exercise 1 – Banner Grabbing

Exercise 2 – Zone Transfers

Exercise 3 – SNMP Enumeration

Exercise 4 – LDAP Enumeration

Exercise 5 – Null Sessions

Exercise 6 – SMB Enumeration

Exercise 7 – SMTP Enumeration

Exercise 8 – Documentation of the assigned tasks

Module 6 Lab – Vulnerability Assessment

Exercise 1 – Run Nessus for Windows

Exercise 2 – Run Saint

Exercise 3 – Documentation of the assigned tasks

Module 7 Lab – Malware

Exercise 1 – Netcat (Basics of Backdoor Tools)

Exercise 2 – Exploiting and Pivoting our Attack

Exercise 3 – Creating a Trojan

Exercise 4 – Documentation of the assigned tasks

Module 8 Lab – Windows Hacking

Exercise 1 – Cracking a Windows Password with Linux

Exercise 2 – Cracking a Windows Password with Cain

Exercise 3 – Covering your tracks via Audit Logs

Exercise 4 – Alternate Data Streams

Exercise 5 – Stegonagraphy

Exercise 6 – Understanding Rootkits

Exercise 7- Windows 7 Client Side Exploit (Browser)

Exercise 8- Windows 2008 SMBv2 Exploit

Exercise 9 – Documentation of the assigned tasks

Module 9 Lab – Hacking UNIX/Linux

Exercise 1 – Setup and Recon – Do you remember how?

Exercise 2 – Making use of a poorly configured service
Exercise 3 – Cracking a Linux password

Exercise 4 – Creating a backdoor and covering our tracks

Exercise 5 – Documentation of the assigned tasks

Module 10 Lab – Advanced Vulnerability and Exploitation Techniques

Exercise 1 – Metasploit Command Line

Exercise 2 – Metasploit Web Interface

Exercise 3 – Exploit-DB.com

Exercise 4 – Saint

Exercise 5 – Documentation

Module 11 Lab – Attacking Wireless Networks

Exercise 1 – War Driving Lab

Exercise 2 – WEP Cracking Lab (classroom only)

Exercise 3 – Documentation

Module 12 Lab – Networks, Sniffing and IDS

Exercise 1 – Capture FTP Traffic

Exercise 2 – ARP Cache Poisoning Basics

Exercise 3 – ARP Cache Poisoning - RDP

Exercise 4 – Documentation

Module 13 Lab – Database Hacking

Exercise 1 – Hacme Bank – Login Bypass

Exercise 2 – Hacme Bank – Verbose Table Modification

Exercise 3 – Hacme Books – Denial of Service

Exercise 4 – Hacme Books – Data Tampering

Exercise 5 – Documentation of the assigned tasks

Module 14 Lab – Hacking Web Applications

Exercise 1 – Input Manipulation

Exercise 2 – Shoveling a Shell

Exercise 3 – Hacme Bank – Horizontal Privilege Escalation

Exercise 4 – Hacme Bank – Vertical Privilege Escalation

Exercise 5 – Hacme Bank – Cross Site Scripting

Exercise 6 – Documentation of the assigned tasks

Module 15 Lab – Cryptography

Exercise 1 – Caesar Encryption

Exercise 2 – RC4 Encryption

Exercise 3 – IPSec Deployment

Post-Class Lab – CORE IMPACT

Exercise 1 – CORE IMPACT