CRT Course Overview

The C-Certified Penetration Tester (CCPT) program takes students of varying IT experience levels and re-skills them so that they can enter the industry not as a trainee but as qualified Penetration Tester making them productive from day one.

This in-depth, hands-on, 2-week course will take you into a rewarding and lucrative career in the Cyber Security world.

Objectives:

To help you forge a successful career within this sector we will thoroughly prepare you to gain two (2) of the most relevant, in-demand, industry recognized qualifications; which are:

+ CREST Practitioner Security Analyst (CPSA)
+ CREST Registered Penetration Tester (CRT)

Course Style:

The training combines Instructor led, Virtual Instructor led, and self-paced e-Learning modules. This “blended learning” approach integrates classroom, hands-on lab exercises and project teamwork to provide both the theoretical and practical training needed to make individuals Cyber Security professionals.

The course will allow our students to leave as sought-after professionals, well-equipped with the in-demand job skills and certifications needed to be employed as technically well rounded professionals in any Cyber Security team.

Course Structure

Step 1 – You meet the pre-requisite requirements (see below)
Step 2 – Receive 2 weeks of instructor lead training.
Step 3 – Enrolled Delegates are issued with a Pearson VUE exam voucher for CPSA exam
to be taken anytime.
Step 4 – Delegates are given access to our iLab services for 30 days.
                The instructor is contactable be email to support practical classes & exercises.
Step 5 – The iLab will give delegates continued access to the learning environment to
practice all the skills you have been taught on the course.
Step 6 – Take the CRT exam at a Crest testing centre near you.

The Penetration tester course will allow our students to leave as sought-after professionals, well-equipped with the in-demand job skills and certifications needed to be employed as technically well rounded professionals in any Cyber Security team.

Book your course

 

Not sure which course is right for you?

Call us on
020 8840 4496 and we’ll help you try and find the best course for you.

Date

Location

Price

Course Booking


March 06-17, 2017

London-Ealing

£4,000.00 + vat

 

July 03-14, 2017

London-Ealing

£4,000.00 + vat

 

November 06-17, 2017

London-Ealing

£4,000.00 + vat

 

 

                                   We Accept

                                     

 

Email us with the discount code wQ234yt for best price.
 






Course Syllabus

CREST Practitioner Security Analyst, CPSA & CREST Registered Tester, CRT

A1 Engagement Lifecycle
A2 Law & Compliance
A3 Scoping
A4 Understanding Explaining  and Managing Risk
A5 Record Keeping, Interim Reporting & Final Results
B1 IP Protocols
B2 Network Architectures
B3 Network Routing
B4 Network Mapping & Target Identification
B5 Interpreting Tool Output
B6 Filtering Avoidance Techniques
B7 Packet Crafting
B8 OS Fingerprinting
B9 Application Fingerprinting and Evaluating Unknown Services
B10 Network Access Control Analysis
B11 Cryptography
B12 Applications of Cryptography
B13 File System Permissions
B14 Audit Techniques
C1 Registration Records
C2 Domain Name Server (DNS)
C3 Customer Web Site Analysis
C4 Google Hacking and Web Enumeration
C5 NNTP Newsgroups and Mailing Lists
C6 Information Leakage from Mail & News Headers
D1 Management Protocols
D2 Network Traffic Analysis
D3 Networking Protocols
D4 IPSec
D5 VoIP
D6 Wireless
D7 Configuration Analysis
E1 Domain Reconnaissance
E2 User Enumeration
E3 Active Directory
E4 Windows Passwords
E5 Windows Vulnerabilities
E6 Windows Patch Management Strategies
E7 Desktop Lockdown
E8 Exchange
E9 Common Windows Applications

F1 User enumeration
F2 Unix vulnerabilities
F3 FTP
F4 Sendmail / SMTP
F5 Network File System (NFS)
F6 R* services
F7 X11
F8 RPC services
F9 SSH
G1 Web Server Operation
G2 Web Servers & their Flaws
G3 Web Enterprise Architectures
G4 Web Protocols
G5 Web Mark-up Languages
G6 Web Programming Languages
G7 Web Application Servers
G8 Web APIs
G9 Web SubComponents
H1 Web Application Reconnaissance
H2 Threat Modelling and Attack Vectors
H3 Information Gathering from Web Mark-up
H4 Authentication Mechanisms
H5 Authorisation Mechanisms
H6 Input Validation
H7 Application Fuzzing
H8 Information Disclosure in Error Messages
H9 Use of Cross Site Scripting Attacks
H10 Use of Injection Attacks
H11 Session Handling
H12 Encryption
H13 Source Code Review
I1 Web Site Structure Discovery
I2 Cross Site Scripting Attacks
I3 SQL Injection
I4 Session ID Attacks
I5 Fuzzing
I6 Parameter Manipulation
I7 Data Confidentiality & Integrity
I8 Directory Traversal
I9 File Uploads
I10 Code Injection

Additional Information

Prerequisites

Foundational knowledge required, preferably CISMP, CompTIA Security+ or equivalent.

Who should attend

This training is intended for individuals who wish to have a rewarding and lucrative career in the Cyber Security world.

Courses