Certified Penetration Testing Expert

Course Overview

Certified Penetration Testing is the advanced level of Ethical Hacking in which the personnel evaluates security of IT network or corporate websites by simulating an attack from external threats and internal threats. This analysis is carried out from the position of a potential attacker and can involve active exploitation of security vulnerabilities.

Security issues uncovered through the penetration test are presented to the system’s owner. Effective penetration tests will couple this information with an accurate assessment of the potential impacts to the organization and outline a range of technical and procedural countermeasures to reduce risks.

Web holes have resulted in the theft of millions of credit cards, major financial loss, and damaged reputations for hundreds of enterprises. The number of computers compromised by visiting web sites altered by attackers is too high to count. The objectives of this certification include penetration-testing methodologies, the legal issues surrounding penetration testing and how to properly conduct a penetration test as well as best practice technical and non-technical techniques specific to conduct a penetration test.

Course Content

  • IP and Malware
  • IP Analysis
  • Types of Malwares
  • Foot-Printing Techniques
  • Information Gathering
  • ICANN Guidelines
  • Hosting Servers
  • Registrant and Hosting Panels
  • Static and Dynamic Websites
  • Pre-Penetration Steps
  • Information Scanning.
  • Hacking using Google
  • Finding Control Panel of Websites
  • Breaking Cpanels
  • Attacking Systems
  • Windows Hacking
  • Phishing
  • Session Hijacking
  • Password Cracking Penetration Testing
  • Web Foot-Printing
  • DNS Hijacking
  • Sub-Domains Scanner
  • Information about target on Web App
  • Webserver Hacking
  • Metasploit
  • Privilege Escalation Attack
  • Rooting
  • Shellcoding
  • Encryption / Decryption
  • Web Application Penetration Testing
  • Social Engineering Penetration Testing
  • XSS Attacks
  • Persistent and Non-Persistent Attacks
  • CSRF
  • Securing XSS Attacks
  • SQL Penetration Testing
  • Blind SQLi
  • Attacks on SQL Server
  • Securing SQLi
  • Database Penetration Testing
  • Different types of CMS identifications
  • Attacks on CMS
  • Joomla Exploits
  • WordPress Exploits
  • Vbulletin Exploits
  • Wireless Penetration Testing
  • WEP and WPA Attacks
  • Security Measures
  • LAN Penetration Testing
  • Client Side Exploits
  • MITM Attacks
  • Sniffing Attacks (http, https)
  • Trojans, Virus and Backdoors Detection
  • Vulnerability Assessments
  • Assessment tools (acunetix, dvwa)
  • Testing Reports and Post Testing Actions
  • Standards and Compliance
  • Cyber Law and Acts
  • CERT-IND and AO
  • Cyber Forensics and Investigations

Inquire Now