Course Overview

Overview: This course teaches penetration testing and will illustrate how to think like an attacker and use industry standard tools to perform penetration testing. The course is aligned with the CREST CRT technical syllabus. Students will learn and perform the different phases of penetration testing assessments. The students will practice using Kali Linux and its tools to perform information gathering, target discovery and enumeration, vulnerability mapping, social engineering, system exploitation, privilege escalation, and maintaining access to compromised systems. The students will also learn to report the results of their assessments.

  • 100% online course - Study anywhere, anytime – all you need is a reliable internet connection

  • CREST, IISP & University of Central Lancashire Accredited Training Course

  • 20 Credits MSc Cybersecurity

  • 1-2 months to complete

  • 6 months, 24-hr remote access to a virtual lab allows you to learn, train and practice your skills in your own time.

  • Level: Intermediate

  • Trainer Online Support

  • Live Online Training also available, Learn More

  • Exam Code: CPT-INF, Hours 3.0 - Type: Hands-On

    (Exam vouchers available only upon full payment)

ICSI | CPT Certified Penetration Tester





Course curriculum

  • 1

    Course: Network Infrastructure Penetration Testing and Ethical Hacking

  • 2

    CPT Lab

    • CPT Lab

  • 3

    Module 1: Introduction to Kali Linux

    • Kali Linux History

    • Kali Linux Installation

    • Kali Linux Configuration

    • Basic Search Utilities

    • Guided Exercise: Finding Files

    • Lab: Starting and Stopping Services

  • 4

    Module 2: Introduction to Pen Testing

    • What is Penetration Testing

    • Vulnerability Scans

    • Methodologies

    • Ethical Issues

    • Legal Issues

    • Quiz: Introduction to Pen Testing

  • 5

    Module 3: Standards

    • Penetration Testing Execution Standard (PTES)

    • PCI DSS

    • NIST 800-115

    • CREST UK

    • OWASP Top 10

    • ISO 27002

    • Quiz: Standards

  • 6

    Module 4: Network Essentials

    • TCP/IP

    • IP Protocols

    • Network Architectures

    • Domain Name Server (DNS)

    • Management Protocols

    • Network Protocols

    • Using Netcat

    • Guided Exercise: Using Netcat

  • 7

    Module 5: Cryptography

    • Basics of Cryptography

    • History of Encryption

    • Symmetric Encryption

    • Asymmetric (Public Key) Encryption

    • Digital Signatures

    • Hashing

    • MAC and HMAC

    • Password Crackers

    • Steganography

    • Cryptanalysis

    • Quiz: Cryptography

  • 8

    Module 6: Information Gathering

    • Passive Information Gathering

    • Google Searching

    • Active Information Gathering

    • DNS Enumeration

    • Guided Exercise: DNS Enumeration

    • Host Discovery

    • Guided Exercise: Host Discovery

    • Port and Operating System Discovery

      FREE PREVIEW
    • Guided Exercise: Ports and Operating System Discovery

    • Fingerprinting and Enumeration

    • Guided Exercise: Fingerprinting and Enumeration

    • Lab: Information Gathering

    • Lab: Information Gathering (Solution)

  • 9

    Module 7: Vulnerability Assessment

    • Vulnerabilities

    • Packet Capture

    • Guided Exercise: Using Wireshark

    • Network Scanners

    • Guided Exercise: Using OpenVAS

    • Nmap NSE

    • Guided Exercise: Using Nmap Scripts

    • Metasploit Framework

    • Guided Exercise: Using Metasploit Framework

    • Web Application Scanners

    • Lab: Finding Vulnerabilities

    • Lab: Finding Vulnerabilities (Solution)

  • 10

    Module 8: Reconnaissance and Exploitation of Windows Services

  • 11

    Module 9: Reconnaissance and Exploitation of Linux/Unix Services

    • User Enumeration

    • Guided Exercise: User Enumeration

    • Linux/Unix Service Enumeration

    • Guided Exercise: Service Enumeration

    • Linux/Unix Vulnerabilities

    • Privilege Escalation & Password Cracking

    • Demo: Linux/Unix Privilege Escalation and Password Cracking

    • Lab: Linux/Unix Vulnerabilities

    • Lab: Linux/Unix Vulnerabilities (Solution)

  • 12

    Module 10: Reconnaissance and Exploitation of Web-Based Applications

    • Web Protocols

    • Web Servers

    • Guided Exercise: Web Servers

    • Web Application Structure Discovery

    • Cross Site Scripting (XSS)

    • Guided Exercise: XSS

    • SQL Injection

    • Guided Exercise: SQL injection

    • Directory Traversal

    • Guided Exercise: Directory Traversal

    • File Uploads

    • Guided Exercise: File Uploads

    • Command Execution

    • Guided Exercise: Command Execution

  • 13

    Module 11: Assessing Databases

    • Microsoft SQL Server

    • Oracle RDBMS

    • MySQL

    • Lab: Assessing Databases

    • Lab: Assessing Databases (Solution)

  • 14

    Module 12: Maintaining Access and Covering Tracks

    • Msfvenom

    • Clearev

    • Lab: Maintaining Access

    • Lab: Maintaining Access (Solution)

  • 15

    Module 13: Documentation and Reporting

    • Writing Pen Test Reports

  • 16

    Module 14: Course Review (CTF)

    • CTF Scenario

  • 17

    CTF Solution

    • CTF Solution

  • 18

    Appendix 1: TCP & UDP Port Numbers

    • TCP Ports

    • UDP Ports

  • 19

    Appendix 2: Command Cheatsheet

    • Cheatsheet

  • 20

    Exam Information

    • Exam Information

Payment options

(50% DISCOUNT, USE CODE GOCYBER DURING CHECKOUT )

Watch Intro Video

Video

Password Cracking

What is included in this course

  • High-quality videos with in-depth content

  • Modular structure – student-directed path

  • Knowledge Checks at end of each module and the course

  • Lab Guide including video Guided Exercises and answer files

  • 6 months 24x7 remote access to a virtual lab

  • Instructor email support

  • 1 exam voucher - Online Exam Proctoring

  • Digital Certificate of Completion