Course Code: 2382

CPTE - Certified Penetration Testing Engineer

Class Dates:
1/28/2019
12/10/2018
Length:
5 Days
Cost:
$2995.00
Class Time:
Technology:
Security
Delivery:
Virtual Instructor-Led Training, Instructor-Led Training

Overview

  • Course Overview
  • The Certified Penetration Testing Engineer course trains students on the 5 key elements of penetration testing: information gathering, scanning, enumeration, exploitation and reporting.

    This course is a 5 day hands-on penetration testing course. Students will spend about 20 hours getting real-world penetration testing experience. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk.

    Course Content With 15 up-to-date Modules and 16 Labs, the C)PTE will not only teach you the know-how of penetration testing, but you'll have real-world experience to solidify what you have learned.

    40 CPE Credits
  • Audience
  • The C)PTE is a course on penetration testing designed for those who already have a basic understanding of cyber security. We recommend an understanding of how computers are networked and how they interact with the internet (TCP/IP). Some of the tools we will use are only developed for Linux; therefor having experience with Linux is a plus. We recommend having the previously mentioned experience or you can prepare to take the course by completing the C)ISSO: Certified Information Systems Officer course as a prerequisite. People who are in or are going into the following professional roles will especially benefit from our course:

    Who Should Attend:
    * Pen Testers
    * Ethical Hackers
    * Network Auditors
    * Cyber Security Professionals
    * Vulnerability Assessors
    * Cyber Security Managers
    * IS Managers

Prerequisites

  • Prerequisites:
    * A minimum of 12 months experience in networking technologies
    * Sound knowledge of TCP/IP
    * Knowledge of Microsoft packages
    * Network+, Microsoft, Security+
    * Basic Knowledge of Linux is essential

  • Recommended Courses:

Course Details

  • Upon Completion Students will:
  • Have knowledge to perform penetration test
  • Have knowledge to accurately report on their findings from examinations
  • Be ready to sit for the C)PTE Exam
  • COURSE DETAILS
  • Module 0: Course Overview
  • Module 1: Business and Technical Logistics of Pen Testing
  • Module 2: Linux Fundamentals
  • Module 3: Information Gathering
  • Module 4: Detecting Live Systems
  • Module 5: Enumeration
  • Module 6: Vulnerability Assessments
  • Module 7: Malware Goes Undercover
  • Module 8: Windows Hacking
  • Module 9: Hacking UNIX/Linux
  • Module 10: Advanced Exploitation Techniques
  • Module 11: Pen Testing Wireless Networks
  • .
  • Module 12: Networks, Sniffing and IDS
  • Module 13: Injecting the Database
  • Module 14: Attacking Web Technologies
  • Module 15: Project Documentation
  • Module 1 Lab – Getting Set Up
  • Exercise 1 – Naming and subnet assignments
  • Exercise 2 – Discovering your class share
  • Exercise 3 – VM Image Preparation
  • Exercise 4 – Discovering the Student Materials
  • Exercise 5 – PDF Penetration Testing Methodology’s
  • Module 2 Lab – Linux Fundamentals
  • Exercise 1 – ifconfig
  • Exercise 2 – Mounting a USB Thumb Drive
  • Exercise 3 – Mount a Windows partition
  • Exercise 4 – VNC Server
  • Exercise 5 – Preinstalled tools in BackTrack 5
  • Module 3 Lab – Information Gathering
  • Exercise 1 – Google Queries
  • Exercise 2 – Footprinting Tools
  • Exercise 3 – Getting everything you need with Maltego
  • Exercise 4 – Using Firefox for Pen Testing
  • Exercise 5 – Documentation of the assigned tasks
  • Module 4 Lab – Detecting Live Systems
  • Exercise 1 – Look@LAN
  • Exercise 2 – Zenmap
  • Exercise 3 – Zenmap in BackTrack 5
  • Exercise 4 – NMAP Command Line
  • Exercise 5 – Hping2
  • Exercise 6 – Unicornscan
  • Exercise 7 – Documentation of the assigned tasks
  • Module 5 Lab – Reconnaissance
  • Exercise 1 – Banner Grabbing
  • Exercise 2 – Zone Transfers
  • Exercise 3 – SNMP Enumeration
  • Exercise 4 – LDAP Enumeration
  • Exercise 5 – Null Sessions
  • Exercise 6 – SMB Enumeration
  • Exercise 7 – SMTP Enumeration
  • Exercise 8 – Documentation of the assigned tasks
  • Module 6 Lab – Vulnerability Assessment
  • Exercise 1 – Run Nessus for Windows
  • Exercise 2 –Run Saint
  • Exercise 3 – Documentation of the assigned tasks
  • Module 7 Lab – Malware
  • Exercise 1 – Netcat (Basics of Backdoor Tools)
  • Exercise 2 – Exploiting and Pivoting our Attack
  • Exercise 3 – Creating a Trojan
  • Exercise 4 – Documentation of the assigned tasks
  • Module 8 Lab – Windows Hacking
  • Exercise 1 – Cracking a Windows Password with Linux
  • Exercise 2 – Cracking a Windows Password with Cain
  • Exercise 3 – Covering your tracks via Audit Logs
  • Exercise 4 – Alternate Data Streams
  • Exercise 5 – Stegonagraphy
  • Exercise 6 – Understanding Rootkits
  • Exercise 7- Windows 7 Client Side Exploit (Browser)
  • Exercise 8- Windows 2008 SMBv2 Exploit
  • Exercise 9 – Documentation of the assigned tasks
  • Module 9 Lab – Hacking UNIX/Linux
  • Exercise 1 – Setup and Recon – Do you remember how?
  • Exercise 2 – Making use of a poorly configured service
  • Exercise 3 – Cracking a Linux password
  • Exercise 4 – Creating a backdoor and covering our tracks
  • Exercise 5 – Documentation of the assigned tasks
  • Module 10 Lab – Advanced Vulnerability and Exploitation Techniques
  • Exercise 1 – Metasploit Command Line
  • Exercise 2 – Metasploit Web Interface
  • Exercise 3 – Exploit-DB.com
  • Exercise 4 – Saint
  • Exercise 5 – Documentation
  • Module 11 Lab – Attacking Wireless
  • Exercise 1 – War Driving Lab
  • Exercise 2 – WEP Cracking Lab (classroom only)
  • Exercise 3 – Documentation
  • Module 12 Lab – Networks, Sniffing and
  • Exercise 1 – Capture FTP Traffic
  • Exercise 2 – ARP Cache Poisoning Basics
  • Exercise 3 – ARP Cache Poisoning – RDP
  • Exercise 4 – Documentation
  • Module 13 Lab – Database Hacking
  • Exercise 1 – Hacme Bank – Login Bypass
  • Exercise 2 – Hacme Bank – Verbose Table Modification
  • Exercise 3 – Hacme Books – Denial of Service
  • Exercise 4 – Hacme Books – Data Tampering
  • Exercise 5 – Documentation of the assigned tasks
  • Module 14 Lab – Hacking Web Applications
  • Exercise 1 – Input Manipulation
  • Exercise 2 – Shoveling a Shell
  • Exercise 3 – Hacme Bank – Horizontal Privilege Escalation
  • Exercise 4 – Hacme Bank – Vertical Privilege Escalation
  • Exercise 5 – Hacme Bank – Cross Site Scripting
  • Exercise 6 – Documentation of the assigned tasks
  • Module 15 Lab – Cryptography
  • Exercise 1 – Caesar Encryption
  • Exercise 2 – RC4 Encryption
  • Exercise 3 – IPSec Deployment
  • Post-Class Lab – CORE IMPACT
  • Exercise 1 – CORE IMPACT