Loading Course Schedule...
PT0986
Summary
The Certified Penetration Testing Consultant, C)PTC , course is designed for IT Security Professionals and IT Network Administrators who are interested in taking an in-depth look into specific penetration testing techniques used against operating systems. This course will teach you the necessary skills to work with a penetration testing team, the exploitation process, and how to create a buffer overflow against programs running on Windows and Linux while subverting features such as DEP and ASLR.
Prerequisites
- 2 years of experience in Networking Technologies
- Sound knowledge of TCP/IP
- Computer hardware knowledge
Duration
5 Days/Lecture & Lab
Audience
- IS Security Officers
- Cybersecurity Managers/Administrators
- Penetration Testers
- Ethical Hackers
- Auditors
Topics
- Penetration Testing Team Formation
- NMAP Automation
- Exploitation Process
- Fuzzing with Spike
- Simple Buffer Overflow
- Stack Based Windows Buffer Overflow
- Web Application Security and Exploitation
- Linux Stack Smashing & Scanning
- Linux Address Space Layout Randomization
- Windows Exploit Protection
- Getting Around SEH ASLR
- Penetration Testing Report Writing