קורס Cyber & Information Security

Cyber Security Penetration Testing Professional Course

CTR-901

carmel-website
carmel website
carmel-website
carmel-website

About this course

This is a 24-hour course that teaches the most practical and thorough education on penetration testing, as the Penetration Testing Professional (PTP) course is a self-paced program designed to develop educated IT security experts. This course provides theoretical aspects reinforced with practical exercises held in the most advanced virtual lab setting in the world, and creates solid foundations.

Audience profile

This CPTP course is advantageous for people who want to advance their careers as professional penetration testers or IT security specialists, whose positions need them to be able to defend their organizations.

At course completion

After completing this course, students will be able to:

  • Students will be tested in a real-world setting at the conclusion of the course and required to create a commercial-grade penetration testing report that accurately pinpoints the flaws in this “interaction”.

Course details

Module 1: System Security

This module will teach students about the system security section and will provide them with a thorough understanding of x86 architecture and its weaknesses. They will be taught about architecture Fundamentals, assembler debuggers and tool arsenal, buffer overflow, shellcode, cryptography, and password cracking, and malware.

Module 2: Network Security

This module will cover security testing methodology, techniques, and tools for networked PC and devices. Topics like information gathering, scanning, enumeration, sniffing and MITM attacks, vulnerability assessment & exploitation, post-exploitation, anonymity, and social engineering.

Module 3: Performing a Penetration Test

This module will teach students about the three phases of the pretest, penetration testing tools and techniques as well as other penetration test steps.

Module 4: Ethical Hacking

Here, you will learn about the role of security and penetration testers, ethical hacking litigations, attacks and ethical hacking commandments, and cracking hackers’ mindsets

Module 5: PowerShell for Pentesters Section

This module educates students on PowerShell is a powerful built-in shell and scripting environment we can utilize as penetration testers considering its wide-spread availability on all modern Windows-based systems. The use of PowerShell allows us to take advantage of the “living off the land” concept, where using tools that are built-in to the Operating System works to our advantage once we’ve obtained access to a system. While studying how to Pentesters enables you to conduct targeted tests on specific portions of your organization, with results that are extremely useful for identifying system flaws – some of which can only be identified through testing – and highlighting the necessary steps to address them.

Module 6: Linux Exploitation Section

This module teaches you about Linux and other variants of UNIX that make up a very large segment of the overall internet infrastructure (including Critical Infrastructure), not to mention the exponentially expanding “Internet of Things” ecosystem of whose devices are mostly dependent on some form of *NIX or another. Those facts make Linux an increasingly popular target.

Module 7: Web Application Security

Today’s penetration testers must master web application attack techniques; this lab-intensive section will teach the student how to conduct a thorough Penetration test against web applications. Here, you will learn how to gather information, also about cross-site scripting, SQL injection, and other web attacks.

Module 8: Wi-fi Security Section

The Wi-Fi Security section is an extremely in-depth section covering the most important attack techniques used against Wi-Fi networks. The student will learn the security mechanisms implemented in Wi-Fi architectures as well as their weaknesses and how to exploit them.

Module 9: Ruby for Pentesters and Metasploit Section

The Ruby for Pentesters and Metasploit section covers Ruby programming from the very basics to advanced techniques, in addition to penetration testing topics. This section also covers topics such as exploiting vulnerable applications with Ruby, as well as creating and editing Metasploit modules. They will learn how Pentesters help organizations identify and resolve security vulnerabilities affecting their digital assets and computer networks.

Module 10: Mastering Kali Linux for Advanced Penetration Testing

The ‘Kill Chain’ approach to penetration testing will be taught in this module as well as starting Kali Linux, identifying the target (passive reconnaissance), active reconnaissance and vulnerability scanning. Also, students will learn of its exploits, post exploit stages in both its action of objective and persistence.

Prerequisites

  • Entry Level exam (American test)
  • No programming skills are required. However, a basic understanding of networks, internet protocols, IT security issues, and penetration testing concepts, as well as the ability to read and understand code will greatly reduce the learning curve of a student.

 

Fill in the details and we will get back to you as soon as possible

Why choose Carmel Training?

We offer quality solutions for professional training that save you time and resources, and provide you with the tools to take your skills one step further!

carmel website

leading lecturers

Have training experience
and practical rich

carmel website

coming to you

You determine the location of the course and the date

carmel website

theory and practice

Study materials and laboratories
Microsoft official available in the cloud

carmel website

customized program

Full and personal adjustment to the requirements and needs of the organization

You might also be interested..

Cyber Security Penetration Testing Professional Course

Skip to content