COURSE BENEFITS
The Certified Penetration Testing Consultant, C)PTC , course is designed for IT Security Professionals and IT Network Administrators who are interested in taking an in-depth look into specific penetration testing and techniques used against operating systems. This course will teach you the necessary skills to work with a penetration testing team, the exploitation process, and how to create a buffer overflow against programs running on Windows and Linux while subverting features such as DEP and ASLR.
All Combos Include
Online Video
Electronic Book
Exam Prep Questions
Cyber Range Lab
C)PTC Key Course Information
Live Class Duration
5 Days
Language
English
CPEs:
40
Class Format
- Instructor-led
- Self-Study
- Live Online Training
Suggested Prior Knowledge:
- Mile2 C)PEH and C)PTE or equivalent knowledge
- 2 years of experience in Networking Technologies
- Sound knowledge of TCP/IP
- Computer hardware knowledge
Applicable Exams:
Mile2 C)PTC
C)PTC Modules
Module 1 - Penetration Testing Team Formation
Module 2 - NMAP Automation
Module 3 - Exploitation Process
Module 4 - Fuzzing with Spike
Module 5 - Simple Buffer Overflow
Module 6 - Stack Based Windows Buffer Overflow
Module 7 - Web Application Security and Exploitation
Module 8 - Linux Stack Smashing & Scanning
Module 9 - Linux Address Space Layout Randomization
Module 10 - Windows Exploit Protection
Module 11 - Getting AroundSEH ASLR
Module 12 - Penetration Testing Report Writing