Vendors

The CPT examination is certified by the Global ACE Certification. The examination framework is designed to align with a set of relevant Knowledge, Skills and Attitudes (KSA) that are necessary for an Information Security Awareness Manager. Candidates will be tested via a combination of either continual assessment (CA), multiple choice (MC), theory/underpinning knowledge assessment (UK), practical assessment (PA), assignments (AS) and case studies (CS) as required.

Candidates can take the examination at authorized examination centres in participating scheme member countries. Candidates who have successfully passed the CPT examination will be eligible to apply as an associate or professional member by fulfilling the membership criteria defined under the Global ACE Scheme.
img-course-overview.jpg

What You'll Learn

  • To understand different attacks used by hackers
  • To learn how to conduct a vulnerability assessment on the network and systems
  • To learn ways to harden the network and systems thus securing the corporate network and systems.
  • To prepare and submit Vulnerability Assessment & Pentest Reports

Who Should Attend

  • Network administrators
  • Network executives
  • Security professionals who insterested in conducting vulnerability assessment and penetration test for their customers.
img-who-should-learn.png

Prerequisites

None.

Learning Journey

Coming Soon...

1. Introduction to Vulnerability Assessment & Penetration Testing
  • Vulnerability Exploit, Payload, Listener
  • Vulnerability Assessment Vs. Penetration Testing
  • Types of Vulnerabilities Vulnerability Research Sources for Penetration Testers, Exploits and
  • Tools sources for Penetration Testers, Commercial Tools for Penetration Testers, Penetration Testing Methodologies and Penetration Test Report Template
  • Latest Attacks – Demos

2. Information Intelligence Techniques
  • Passive Information Gathering
  • Information intelligence and Map the Customer organization
  • Information intelligence and Map the infrastructure of the Target

3. Scanning & Vulnerability Assessment
  • Scanning Types & Scan Options
  • NMap Scanning
  • Ninja & Non-Ninja Scan types
  • Multiple IP Addresses scanning
  • Host Discovery
  • Ping & Port Scanning
  • OS Fingerprinting & Service Enumerations
  • NMap Scripts
  • Host Scanning : Bypassing Firewalls
  • Decoys
  • ZenMap
  • Netcat Fingerprinting
  • Nessus : Vulnerability Scanning & Reporting
  • NeXpose : Vulnerability Scanning & Reporting
  • OpenVAS
4. Cracking & Social Engineering
  • MiTM Concepts & Attacks
  • Password Cracking
  • Brute Force Tools : Hydra, Medusa
  • Crunch Password generator
  • FTP Credential cracking
  • Telnet Brute Force
  • SSH Login Brute Force Attack
  • Password cracking with John the Ripper
  • Social Engineering Attacks : Java Applet Attack Vectors, Infectious Media Generator, Credential Harvester Attack Method, Spear-Phishing Attack Method and many more

5. Exploitation & Pentest
  • Metasploit Framework Concepts
  • Metasploit Community & Armitage
  • Metasploit Exploitations : Dump Password Hash, Capture Screenshots, Capture Keystrokes,
  • Privilege Escalation, Pivoting, ARP Scan, Stdapi and Priv, Persistence and Backdoors
  • (Maintaining Access), Cover Tracks, Post Exploitations.
  • Anti-Virus Evasion Framework and Methods
  • Netcat Exploitations
  • Backdoor using msfvenom & Netcat
  • Advanced Exploitations using PowerShell
  • USB Based exploitation on Win 7 & Win 10
  • Pentest Reporting

6. PowerShell Exploitation
  • PowerShell Basics
  • PowerShell Log Analysis
  • PowerShell Malwares to evade Defenses

7. Web Pentest
  • Web Application Basics
  • Web Application Fingerprinting
  • Payment Gateway & Order Tampering
  • Labs on OWASP TOP 10 Vulnerabilities and its sub categories using Mutillidae, DVWA [SQL Injection, Cross Site Scripting, Cross Site Request Forgery, LDAP Injection, Command Injection, Parameter/Form Tampering, Payment Gateway hacking, Improper Error Handling, Directory Traversal, Insecure storage, Information Leakage, Broken Account Management, Denial of Service, Buffer Overflow, Broken Session Management, Session Fixation, Security Misconfiguration, File Upload and Download and many more ]
  • Pentest Reporting
8. Wireless Pentest
  • Introduction on WEP, WPA, WPA2
  • Wireless cracking with Reaver
  • Uncovering hidden SSIDs
  • WiFi Twining Attacks
  • WiFi Pineapple based attacks
Certified Penetration Tester is 5 days hands-on training and certification programmes that enable the participants handle the vulnerability assessment and penetration test for their customers.

Frequently Asked Questions (FAQs)

  • Why should I pick up this course and get certified?

    Career Advancement: Boost your earning potential and unlock new job opportunities.

    Stay Relevant: Keep your skills current in the ever-changing tech landscape.

    Problem-Solving Prowess: Hone your critical thinking and problem-solving abilities.

    Hands-On Experience: Apply your knowledge through practical labs and projects.

    Expand Your Network: Connect with industry experts and like-minded professionals.

  • Why take this course with Trainocate?

    Here’s what sets us apart:

    - Global Reach, Localized Accessibility: Benefit from our geographically diverse training hubs in 24 countries (and counting!).

    - Top-Rated Instructors: Our team of subject matter experts (with high average CSAT and MTM scores) are passionate to help you accelerate your digital transformation.

    - Customized Training Solutions: Choose from on-site, virtual classrooms, or self-paced learning to fit your organization and individual needs.

    - Experiential Learning: Dive into interactive training with our curated lesson plans. Participate in hands-on labs, solve real-world challenges, and take on comprehensive assessments.

    - Learn From The Best: With 30+ authorized training partnerships and countless awards from Microsoft, AWS, Google – you're guaranteed learning from the industry's elite.

    - Your Bridge To Success: We provide up-to-date course materials, helpful exam guides, and dedicated support to validate your expertise and elevate your career.

Keep Exploring

Course Curriculum

Course Curriculum

Training Schedule

Training Schedule

Exam & Certification

Exam & Certification

FAQs

Frequently Asked Questions

img-improve-career.jpg

Improve yourself and your career by taking this course.

img-get-info.jpg

Ready to Take Your Business from Great to Awesome?

Level-up by partnering with Trainocate. Get in touch today.

Name
Email
Phone
I'm inquiring for
Inquiry Details

By submitting this form, you consent to Trainocate processing your data to respond to your inquiry and provide you with relevant information about our training programs, including occasional emails with the latest news, exclusive events, and special offers.

You can unsubscribe from our marketing emails at any time. Our data handling practices are in accordance with our Privacy Policy.