The C-Registered Penetration Tester (CRPT) program takes students of varying IT experience levels and re-skills them so that they can enter the industry not as a trainee but as qualified Penetration Tester making them productive from day one.
This in-depth, hands-on, 2-week course will take you into a rewarding and lucrative career in the Cyber Security world.
To help you forge a successful career within this sector we will thoroughly prepare you to gain two (2) of the most relevant, in-demand, industry recognized qualifications; which are:
+ CREST Practitioner Security Analyst (CPSA)
+ CREST Registered Penetration Tester (CRT)
The training combines Instructor led, Virtual Instructor led, and self-paced e-Learning modules. This “blended learning” approach integrates classroom, hands-on lab exercises and project teamwork to provide both the theoretical and practical training needed to make individuals Cyber Security professionals.
The course will allow our students to leave as sought-after professionals, well-equipped with the in-demand job skills and certifications needed to be employed as technically well rounded professionals in any Cyber Security team.
Step 1 – You meet the pre-requisite requirements (see below)
Step 2 – Receive 2 weeks of instructor lead training.
Step 3 – Enrolled Delegates are issued with a Pearson VUE exam voucher for CPSA exam
to be taken anytime.
Step 4 – Delegates are given access to our iLab services for 30 days.
The instructor is contactable be email to support practical classes & exercises.
Step 5 – The iLab will give delegates continued access to the learning environment to
practice all the skills you have been taught on the course.
Step 6 – Take the CRT exam at a Crest testing centre near you.
The Penetration tester course will allow our students to leave as sought-after professionals, well-equipped with the in-demand job skills and certifications needed to be employed as technically well rounded professionals in any Cyber Security team.
11000+ Trained Globally- including FTSE 250
Classroom based small, highly interactive sessions.
Widest range of Cyber courses – Select on your exact needs.
The best content developed by qualified professionals.
Great value – Exceptional quality at a great price.
British Computer Society
Call us on
020 8840 4496 and we’ll help you try and find the best course for you.
C-Registered Penetration Tester
Law & compliance
Wi-Fi protocols and security
Tools showcase (basic concepts and usage) – DEMO
Tools showcase – LAB
Pivoting with various tools
Web applications security incidents
Web technologies and concepts
Web application frameworks
Web servers concepts and differences
Bypassing client side controls
OWASP TOP 10: Injection (A1)
OWASP TOP 10: XSS/CSRF (A3/A8)
OWASP TOP 10: Broken authentication and session management (A2)
Other common web application vulnerabilities
Microsoft SQL server
Web application database connectivity
BoF (Buffer overflow)
using VMware, Virtual box, Hyper-V – at least one of mentioned platforms
being able to create and use VMs, configure networking (bridge, NAT) in abovementioned platforms
understand that VMs can be converted from one platform to another
being able to configure IP settings on various windows and Linux OSs
being able to configure routing and manipulate routing tables on windows and Linux OSs
understanding basic troubleshooting tools and being able to fix troubleshoot networking issues related to IP, DNS, DG,
being able to perform software installation, uninstallation, OS updates at least on windows and preferably Linux OSs
know how to create users and add users to groups at least on widows and preferably Linux OSs
being able to troubleshoot computer boot issues
Know how to enter the BIOS and modify various settings
Understand boot sequence and preferably BIOS POST procedure
general computer user knowledge related to:
file copy and paste
command line tools usage and understanding on command vs. switches
compression tool usage
good understanding on different file types on windows and what to do with them
Being able to work in a stressful situations
Being able to learn without supervision
Being able to think out of the box
This training is intended for individuals who wish to have a rewarding and lucrative career in the Cyber Security world.