CERTIFIED PENETRATION TESTING CONSULTANT

Similar documents
Certified Penetration Testing Specialist

CYBERTRON NETWORK SOLUTIONS

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Certified Penetration Testing Engineer

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Certified Ethical Hacker (CEH)


VMware: Advanced Security

CEH Version8 Course Outline

Certified Penetration Testing Specialist

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Vulnerability Assessment and Penetration Testing

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Detailed Description about course module wise:

Ethical Hacking Course Layout

CRYPTUS DIPLOMA IN IT SECURITY

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Build Your Own Security Lab

Certified Penetration Testing Specialist (CPTS) with CEH Backtrack

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Network Security Fundamentals

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Description: Objective: Attending students will learn:

Certified Penetration Testing Engineer

Network Security and Firewall 1

IINS Implementing Cisco Network Security 3.0 (IINS)

CERTIFIED PENETRATION TESTING SPECIALIST DISTANCE LEARNING TRAINING COURSE (SINGLE-USER, DVD-ROM)

C)PTE Penetration Testing Engineer

C)PTE Course & Lab Outlines

CERTIFIED PENETRATION TESTING ENGINEER

CERTIFIED PENETRATION TESTING ENGINEER

InfoSec Academy Pen Testing & Hacking Track

INFORMATION SECURITY TRAINING CATALOG (2015)

Certified Penetration Testing Engineer

Securing Cisco Network Devices (SND)

EC Council Certified Ethical Hacker V8

Information Security. Training

Penetration Testing with Kali Linux

Implementing Cisco IOS Network Security

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

[CEH]: Ethical Hacking and Countermeasures

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Security + Certification (ITSY 1076) Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

C)PTC Certified Penetration Testing Consultant

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Certified Penetration Testing Engineer

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

SONDRA SCHNEIDER JOHN NUNES

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

CS5008: Internet Computing

2016 TÜBİTAK BİLGEM Cyber Security Institute

INFORMATION SECURITY TRAINING CATALOG (2016)

SCP - Strategic Infrastructure Security

Learn Ethical Hacking, Become a Pentester

Linux Network Security

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

Certified Penetration Testing Consultant

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

INFORMATION SECURITY TRAINING

Audience. Pre-Requisites

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Network Attacks and Defenses

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Web App Security Audit Services

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

General Network Security

Demystifying Penetration Testing

Course Content: Session 1. Ethics & Hacking

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Network Defense Specialist. Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems

Networking: EC Council Network Security Administrator NSA

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

FSP-201: Ethical Hacking & IT Security

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Ethical Hacking v7 40 H.

Loophole+ with Ethical Hacking and Penetration Testing

ETHICAL HACKING. By REAL TIME FACULTY

Hosts HARDENING WINDOWS NETWORKS TRAINING

Cyber Essentials. Test Specification

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

FORBIDDEN - Ethical Hacking Workshop Duration

Certified Penetration Testing Engineer (CPTEningeer)

CompTIA Security+ (Exam SY0-410)

Transcription:

Cyber Security Training & Consulting CERTIFIED PENETRATION TESTING CONSULTANT COURSE OVERVIEW 4 Days 32 CPE Credits $3,500 The Certified Penetration Testing Consultant course is our advanced course in our penetration testing track. The C)PTC is designed for cyber security professionals and IT network administrators who are interested in conducting Penetration tests against large network infrastructures, such as large corporate networks. The training starts with capturing and analyzing basic packets and continues with Layer2 attack vectors; Layer3 based attacks, including both IPv4 and IPv6 stacks, routing protocol attacks (OSPF, BGP, etc); Service Provider level attacks related with very common used MPLS; how to use relays and pivots; VPN attacks including IPSEC protocol suite; SSL attacks; and finally covers NIDS/NIPS evasion and implementation techniques. At the completion of each module, students are going to be able to practice their knowledge with the lab exercises that are specifically prepared for the covered materials during the theory. UPON COMPLETION Students will: Have the ability to plan, manage, and execute a penetration test. Have knowledge to properly report on a penetration test results. Be ready to sit for the C)PTC exam. C)PTC TRACK Professional Roles: Security Consultant IT Management Chief Security Officer Prerequisites: C)PTE: Penetration Testing Engineer OR Equivalent Experience C)PTC Exam: 6 Hours Find 80% of Vulnerabilities & Written Report $600 USD Purchase on mile2.com Relevant Courses: C)DRE: Disaster Recovery Engineer C)IHE: Incident Handling Engineer LAB OBJECTIVES This is an intensive hands-on class. Students often spend 20 hours or more performing our labs that simulate real-world situations. During labs, students move through a detailed lab guide containing screen shots, commands to be typed, and other steps to be taken. Students will use cutting-edge penetration testing tools and learn about current security developments. Our course remains up to date because those involved with development of the course and those teaching it all practice in the industry. EXAM INFORMATION The Certified Penetration Testing Consultant exam is a 6 hour practical in which you will be conducting both a Vulnerability Assessment and a Full Penetration Test on two IP's. You will then be given 60 days to turn in a written Penetration Test report that will be analyzed by our team of experts. You are required to find at least 80% of the vulnerabilities and then manually test to see if they are legitimate. The report will need to be professionally written, grammatically correct and accurate. This exam is a Pass or Fail. The C)PTC exam is taken online through Mile2 s Assessment and Certification System ( MACS ), which is accessible on your mile2.com account. The cost is $300 USD and must be purchased from the store on Mile2.com.

Page No. 2 COURSE CONTENT Module 1: Packet Capturing Module 2: Layer 2 Attacks Module 3: Layer 3 Attacks on Cisco Based Infrastructures Module 4: Pivoting and Relays Module 5: IPv6 Attacks Module 6: VPN Attacks Module 7: Defeating SSL Module 8: IDS/IPS Evasion Lab 1: Working with Captured Files Lab 2: Layer 2 Attacks Lab 3: Attacking Routing Protocols Lab 4: Using Pivot Machines Lab 5: IPv6 Attacks Lab 6: VPN attack Lab 7: Defeating SSL, Decrypting Traffic and man-in-the-middle attacks Lab 8: NIDS/NIPS

Page No. 3 DETAILED MODULE DESCRIPTION Module 1 - Security Fundamentals The Growth of Environments and Security Our Motivation The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall First Line of Defense IDS Second Line of Defense IPS Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types Circuit-Level Proxy Firewall Type of Circuit- Level Proxy SOCKS Firewall Types Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO of Database Server Module 2 - Access Controls Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls Soft Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Module 3 - Protocols Protocols OSI Application Layer OSI Presentation Layer OSI Session Layer OSI - Transport Layer OSI Network Layer OSI Data Link OSI Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite

Page No. 4 Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ARP Protocols ICMP Network Service DNS SSH Security Protocol SSH Protocols SNMP Protocols SMTP Packet Sniffers Example Packet Sniffers Module 4 -Cryptography Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Module 5 - Why Vulnerability Assessments? What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Statement Project Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information s, and Hand -On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis

Page No. 5 ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management s Response to Identified Risks Liability of Actions Policy (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Module 6 - Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Module 7 - Output Analysis and Reports Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Module 8 - Reconnaissance, Enumeration and Scanning Reconnaissance Step One in the Hacking Life-Cycle What Information is Gathered by the? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Should Reveal Popular Port Scanning Tools Ping (Is the host online?) Stealth Online Ping TCP 3-Way Handshake TCP Flags TCP Connect Port Scan Half-open Scan (SynScan) Firewalled Ports NMAP TCP Connect Scan Enumeration Web Server Banners HTTPrint DNS Enumeration SNMP Insecurity SNMP Enumeration Tools SNMP Enumeration Countermeasures Active Directory Enumeration LDAPMiner AD Enumeration Countermeasures Null Sessions Viewing Shares

Page No. 6 Tool: DumpSec Tool: Enumeration with Cain and Abel Null Session Countermeasures (cont.) Module 9 - Gaining Access How Do Exploits Work? Physical Access Attacks Lock Picking Tool Kit: Torque Wrench Tool Kit: Picks Tool Kit: Snap Gun Tool Kit: Electric Pick Internal Mechanism Pin Tumblers Pin Tumblers Picking Binding Pin Binding Binding Order Raking Bumping Bump Keying Shimming Door Locks Padlocks Bypassing Padlock Shims Shock Energy Lock Picking Countermeasures The Metasploit Project Defense in Depth Instructor Demonstration SaintExploit at a Glance SaintExploit Interface Core Impact Core Impact Module 10 - Maintaining Access Back Doors Backdoor via Rootkits Linux Backdoor via Rootkits Linux Backdoor via Rootkits Windows RootKit Countermeasures Tool: Netcat Netcat Switches Netcat as a Listener Meterpreter Module 11 - Covering Tracks Covering Tracks Disabling Auditing Clearing and Event Log Hiding Files with NTFS Alternate Data Stream NTFS Streams Countermeasures Stream Explorer What is Steganography? Steganography Tools Shedding Files Left Behind Leaving No Local Trace More Anonymous Software StealthSurfer II Privacy Stick Tor: Anonymous Internet Access Encrypted Tunnel Notes Module 12 - Malware Distributing Malware Malware Capabilities Countermeasure: Monitoring Autostart Methods Tool: Netcat Netcat Switches Netcat as a Listener Executable Wrappers Benign EXE s Historically Wrapped with Trojans Tool: Restorator Tool: Exe Icon The Infectious CD-Rom Technique Trojan: Backdoor.Zombam.B Trojan: JPEG GDI+ All in One Remote Exploit Advanced Trojans: Avoiding Detection BPMTK Malware Countermeasures Gargoyle Investigator Spy Sweeper Enterprise CM Tool: Port Monitoring Software CM Tools: File Protection Software CM Tool: Windows File Protection CM Tool: Windows Software Restriction Policies CM Tool: Hardware Malware Detectors Countermeasure: User Education Module 13 - Buffer Overflows Buffer Overflow Definition

Page No. 7 Overflow Illustration Buffer Overflows Memory Organization How Buffers and Stacks Are Supposed to Work Stack Function How a Buffer Overflow Works Buffer Overflows Secure Code Prevention Module 14 - Password Cracking Attack Vectors Unix Passwords and Encryption Password Cracking Tools NAT Dictionary Attack Tool THC-Hydra Password Guessing Password Cracking LM/NTLM Hashes LM Hash Encryption NT Hash Generation Windows Syskey Encryption Creating Rainbow Tables Free Rainbow Tables NTPASSWD:Hash Insertion Attack Password Sniffing Sniffing Remote Passwords Tool: Cain and Abel Appendix 1 - Economics and Law Attack Vectors Unix Passwords and Encryption Password Cracking Tools NAT Dictionary Attack Tool THC-Hydra Password Guessing Password Cracking LM/NTLM Hashes LM Hash Encryption NT Hash Generation Windows Syskey Encryption Creating Rainbow Tables Free Rainbow Tables NTPASSWD:Hash Insertion Attack Password Sniffing Sniffing Remote Passwords Tool: Cain and Abel Appendix 2 - Vulnerability Types Critical Vulnerabilities Critical Vulnerability Types Buffer Overflows URL Mappings to Web Applications IIS Directory Traversal Format String Attacks Default Passwords Misconfigurations Known Backdoors Information Leaks Memory Disclosure Network Information Version Information Path Disclosure User Enumeration Denial of Service Best Practices Lab Appendix 3 - Assessing Web Servers Web Servers Fingerprinting Accessible Web Servers Identifying and Assessing Reverse Proxy Mechanisms Proxy Mechanisms Identifying Subsystems and Enabled Components Basic Web Server Crawling Web Application Technologies Web Application Profiling HTML Sifting and Analysis Active Backend Database Technology Assessment Why SQL Injection? Web Application Attack Strategies Web Application Vulnerabilities Authentication Issues Parameter Modification SQL Injection: Enumeration SQL Extended Stored Procedures Shutting Down SQL Server Direct Attacks SQL Connection Properties

Page No. 8 Attacking Database Servers Obtaining Sensitive Information URL Mappings to Web Applications Query String Changing URL Login Parameters URL Login Parameters Cont. IIS Directory Traversal Cross-Site Scripting (XSS) Web Security Checklist Appendix 4 - Assessing Remote & VPN Services Assessing Remote & VPN Services Remote Information Services Retrieving DNS Service Version Information DNS Zone Transfers Forward DNS Grinding Finger Auth NTP SNMP Default Community Strings LDAP rwho RPC rusers Remote Maintenance Services FTP SSH Telnet X Windows Citrix Microsoft Remote Desktop Protocol VNC Assessing IP VPN Services Microsoft PPTP SSL VPNs Appendix 5 - Denial of Service DDoS Issues DDoS Zombie Definition DDoS Attack Types Wifi Denial of Service (DoS) Evading The Firewall and IDS Evasive Techniques Firewall Normal Operation Evasive Technique -Example Evading With Encrypted Tunnels Man-in-the-middle Attacks ARP Cache Poisoning ARP Normal Operation ARP Cache Poisoning ARP Cache Poisoning (Linux) Tool: Cain and Abel Ettercap Countermeasures What is DNS spoofing? Tools: DNS Spoofing Breaking SSL Traffic Tool: Breaking SSL Traffic Tool: Cain and Abel Voice over IP (VoIP) Intercepting VoIP Session Hijacking