Certified Penetration Tester
Certified Penetration Tester
Vulnerability Assessment
Module 7
Password Cracking
Module 8
Module 10
IDS, IPS and Firewall Evasions
Module 11
Malware and Metasploit
Module 12
Denial of Service Attacks and Defences
Module 13
Social Engineering Attacks
Module 14
Web Application Penetration Testing
Module 15
Buffer Overflow attacks
Module 16
Wireless Penetration Testing
Module 17
Penetration Testing Standards and Methodologies
Module 18
Penetration Testing Project
Penetration Testing Viewpoints
External vs. Internal
Penetration Testing can be performed from the
viewpoint of an external attacker or a
malicious employee.
Overt vs. Covert
Methods:
Methods:
Scanning programs that identify live hosts, open ports,
services, and other info (Nmap, autoscan)
DNS Querying
Route analysis (traceroute)
Vulnerability Testing and Exploitation
To check hosts for known vulnerabilities and to see if they are
exploitable, as well as to assess the potential severity of said
vulnerabilities.
Methods:
Remote vulnerability scanning (Nessus, OpenVAS)
Active exploitation testing
Methods:
Documentation tools (Dradis)
o *Organizes information by hosts, services,
identified hazards and risks, recommendations to
fix problems
What Will You Learn in CPT ?
Understanding the essentials of computer networks and
architecture
Leveraging Linux for ethical hacking practices
Understanding privacy and anonymity
Understanding Open Source Intelligence (OSINT)
Advanced protocol enumerations and scanning
Identifying and assessing vulnerabilities
Cracking passwords and secure access
Hacking organizational systems, networks, and applications
Evaluating post-exploitations
Inspecting packets precisely
Performing active sniffing attacks
Who needs Penetration Testing?
Banks/Financial Institutions, Government Organizations,
Online Vendors, or any organization processing and
storing private information
Most certifications require or recommend that
penetration tests be performed on a regular basis to ensure
the security of the system.
PCI Data Security Standard's Section 11.3 requires
organizations to perform application and penetration tests
at least once a year.
HIPAA Security Rule's section 8 of the Administrative
Safeguards requires security process audits,
periodic vulnerability analysis and penetration testing.
.
THANKYOU
THANK YOU