CRPT Web Application – Course Overview

The C-Registered Penetration Tester – Web Application (CRPTWA) program takes students of varying IT experience levels and re-skills them so that they can enter the industry not as a trainee but as qualified Penetration Tester making them productive from day one.

This in-depth, hands-on, week Long course will take you into a rewarding and lucrative career in the Cyber Security world.

Objectives:

To help you forge a successful career within this sector we will thoroughly prepare you to gain two (2) of the most relevant, in-demand, industry recognized qualifications; which are:

+ CREST Practitioner Security Analyst (CPSA)
+ CREST Registered Penetration Tester (CRT)

Course Style:

The training combines Instructor led, Virtual Instructor led, and self-paced e-Learning modules. This “blended learning” approach integrates classroom, hands-on lab exercises and project teamwork to provide both the theoretical and practical training needed to make individuals Cyber Security professionals.

The course will allow our students to leave as sought-after professionals, well-equipped with the in-demand job skills and certifications needed to be employed as technically well rounded professionals in any Cyber Security team.

Course Structure

Step 1 – You meet the pre-requisite requirements (see below)
Step 2 – Receive 2 weeks of instructor lead training.
Step 3 – Enrolled Delegates are issued with a Pearson VUE exam voucher for CPSA exam
to be taken anytime.
Step 4 – Delegates are given access to our iLab services for 30 days.
                The instructor is contactable be email to support practical classes & exercises.
Step 5 – The iLab will give delegates continued access to the learning environment to
practice all the skills you have been taught on the course.
Step 6 – Take the CRT exam at a Crest testing centre near you.

The Penetration tester course will allow our students to leave as sought-after professionals, well-equipped with the in-demand job skills and certifications needed to be employed as technically well rounded professionals in any Cyber Security team.

Book your course

 

Not sure which course is right for you?

Call us on
020 8840 4496 and we’ll help you try and find the best course for you.

Date

Location

Price

Course Booking


July 17-21, 2017

London-Ealing

£1,995.00 + vat

 

Nov 13-17, 2017

London-Ealing

£1,995.00 + vat

 

 

                                   We Accept

                                     

 

Email us with the discount code wQ234yt for best price.
 






Math Captcha8 + 1 =


C-Registered Penetration Tester  –  Web Application

 

Web applications security incidents

Web technologies and concepts

Web application frameworks

Web servers concepts and differences

 

Bypassing client side controls

Authentication attacks

Design/Implementation flaws

 

OWASP TOP 10: Injection (A1)

OWASP TOP 10: XSS/CSRF (A3/A8)

 

OWASP TOP 10: Broken authentication and session management (A2)

Other common web application vulnerabilities

 

Microsoft SQL server

Oracle RDBMS

MySQL

Web application database connectivity

 

BoF (Buffer overflow)

Additional Information

Prerequisites

Virtualization

using VMware, Virtual box, Hyper-V – at least one of mentioned platforms

being able to create and use VMs, configure networking (bridge, NAT) in abovementioned platforms

understand that VMs can be converted from one platform to another

Networking

being able to configure IP settings on various windows and Linux OSs

being able to configure routing and manipulate routing tables on windows and Linux OSs

understanding basic troubleshooting tools and being able to fix troubleshoot networking issues related to IP, DNS, DG,

Operating System

being able to perform software installation, uninstallation, OS updates at least on windows and preferably Linux OSs

know how to create users and add users to groups at least on widows and preferably Linux OSs

being able to troubleshoot computer boot issues

Hardware

Know how to enter the BIOS and modify various settings

Understand boot sequence and preferably BIOS POST procedure

General knowledge

general computer user knowledge related to:

Internet browsing,

file copy and paste

file permissions

command line tools usage and understanding on command vs. switches

compression tool usage

good understanding on different file types on windows and what to do with them

Soft skills

Being able to work in a stressful situations

Being able to learn without supervision

Being able to think out of the box

Who should attend

This training is intended for individuals who wish to have a rewarding and lucrative career in the Cyber Security world.

Courses