The Certified Penetration Testing Consultant, PTC , course is designed for IT Security Professionals and IT Network Administrators who are interested in taking an in-depth look into specific penetration testing and techniques used against operating systems. This course will teach you the necessary skills to work with a penetration testing team, the exploitation process, and how to create a buffer overflow against programs running on Windows and Linux while subverting features such as DEP and ASLR.
– Mile2 C)PEH and C)PTE or equivalent knowledge
– 2 years of experience in Networking Technologies
– Sound Knowledge of TCP/IP
– Computer Hardware Knowledge
Course Content
Module 1 – Penetration Testing Team Formation
Module 2- NMAP Automation
Module 3 – Exploitation Process
Module 4 – Fuzzing with Spike
Module 5 – Simple Buffer Overflow
Module 6 – Stack Based Windows Buffer Overflow
Module 7 – Web Application Security and Exploitation
Module 8 – Linux Stack Smashing & Scanning
Module 9 – Linux Address Space Layout Randomization