Certified Penetration Testing Consultant
This propelled level credential course is intended for IT Network Administrators and IT Security Professionals who are keen on leading Penetration tests against enormous system foundations like Services Providers, huge corporate networks, and Telecommunication Companies.
This propelled level credential course is intended for IT Network Administrators and IT Security Professionals who are keen on leading Penetration tests against enormous system foundations like Services Providers, huge corporate networks, and Telecommunication Companies.
More Information:
- Learning Style: On Demand
- Learning Style: Certification
- Difficulty: Advanced
- Course Duration: 7 Hours
- Course Info: Download PDF
- Certificate: See Sample
Need Training for 5 or More People?
Customized to your team's need:
- Annual Subscriptions
- Private Training
- Flexible Pricing
- Enterprise LMS
- Dedicated Customer Success Manager
Course Information
About this Exam:
We should have an understanding of what Penetration Testing is. Penetration testing (also known as pen testing) is the act of testing a PC framework, Web application or network to discover vulnerabilities that an assailant could abuse. Penetration testing ordinarily incorporates network application security testing and Penetration testing and also procedures and controls around the systems and applications and ought to happen from both outside the network attempting to come in (outer testing) and from inside the system. This propelled level credential course is intended for IT Network Administrators and IT Security Professionals who are keen on leading Penetration tests against enormous system foundations like Services Providers, huge corporate networks, and Telecommunication Companies. This credential course helps the understudies in the preparation for the Certification Exam of CPTC.
The normal compensation for a Certified Penetration Testing Consultant is $88,080 every year.
Course Objective:
- Set up an industry acceptable process for pen testing
- Packet Capturing
- Layer 2 Attacks
- Pivoting and Relays
- Layer 3 Attacks on Cisco Based Infrastructures
- IPv6 Attacks
- Defeating SSL
- VPN Attacks
- IDS/IPS Evasion
Audience:
This course is designed for:
- Cyber Security Admins and Managers
- IS Security Officers
- Penetration Testers
- Auditors
- Ethical Hackers
Prerequisites:
- At least 2 years of experience in Networking Technologies
- Computer hardware knowledge
- Sound knowledge of TCP/IP
Suggested prerequisites courses:
- Certified Security Leadership Officer
- Software-Defined Networking Fundamentals - LFS265
- Linux Networking and Administration - LFS211