Course Overview
Overview: This course teaches penetration testing and will illustrate how to think like an attacker and use industry standard tools to perform penetration testing. The course is aligned with the CREST CRT technical syllabus. Students will learn and perform the different phases of penetration testing assessments. The students will practice using Kali Linux and its tools to perform information gathering, target discovery and enumeration, vulnerability mapping, social engineering, system exploitation, privilege escalation, and maintaining access to compromised systems. The students will also learn to report the results of their assessments.
100% online course - Study anywhere, anytime
CREST, IISP & University of Central Lancashire Accredited Training Course
20 Credits MSc Cybersecurity
1-2 months to complete
6 months, 24-hr remote access to a virtual lab allows you to learn, train and practice your skills in your own time.
Level: Intermediate
Trainer Online Support
Exam Code: CPT-INF, Hours 3.0 - Type: Hands-On (Exam vouchers available only upon full payment)
ICSI | CPT Certified Penetration Tester



Course Curriculum
- Introduction
- Kali Linux History
- Kali Linux Installation
- Demo: Kali Linux Installation (Video)
- Kali Linux Configuration
- Demo: Kali Linux Configuration
- Basic Search Utilities
- Guided Exercise: Finding Files
- Guided Exercise: Finding Files (Video)
- Lab: Starting and Stopping Services
- What is Penetration Testing
- Vulnerability Scans
- Methodologies
- Ethical Issues
- Legal Issues
- Quiz: Introduction to Pen Testing
- Penetration Testing Execution Standard (PTES)
- PCI DSS
- NIST 800-115
- CREST UK
- OWASP Top 10
- ISO 27002
- Quiz: Standards
- TCP/IP
- IP Protocols
- Network Architectures
- Domain Name Server (DNS)
- Management Protocols
- Network Protocols
- Using Netcat
- Guided Exercise: Using Netcat
- Guided Exercise: Using Netcat (Video)
- Basics of Cryptography
- History of Encryption
- Symmetric Encryption
- Asymmetric (Public Key) Encryption
- Digital Signatures
- Hashing
- MAC and HMAC
- Password Crackers
- Steganography
- Cryptanalysis
- Quiz: Cryptography
- Passive Information Gathering
- Google Searching
- Active Information Gathering
- DNS Enumeration
- Guided Exercise: DNS Enumeration
- Guided Exercise: DNS Enumeration (Video)
- Host Discovery
- Guided Exercise: Host Discovery
- Guided Exercise: Host Discovery (Video)
- Port and Operating System Discovery
- Guided Exercise: Ports and Operating System Discovery
- Guided Exercise: Ports and Operating System Discovery (Video)
- Fingerprinting and Enumeration
- Guided Exercise: Fingerprinting and Enumeration
- Guided Exercise: Fingerprinting and Enumeration (Video)
- Lab: Information Gathering
- Lab: Information Gathering (Solution)
- Vulnerabilities
- Packet Capture
- Guided Exercise: Using Wireshark
- Guided Exercise: Using Wireshark (Video)
- Network Scanners
- Guided Exercise: Using OpenVAS
- Guided Exercise: Using OpenVAS (Video)
- Nmap NSE
- Guided Exercise: Using Nmap Scripts
- Guided Exercise: Using Nmap Scripts (Video)
- Metasploit Framework
- Guided Exercise: Using Metasploit Framework
- Guided Exercise: Using Metasploit Framework (Video)
- Web Application Scanners
- Lab: Finding Vulnerabilities
- Lab: Finding Vulnerabilities (Solution)
- Important Windows Files
- Logs
- The Registry
- Active Directory Reconnaissance
- Guided Exercise: Active Directory Reconnaissance
- Guided Exercise: Active Directory Reconnaissance (Video)
- User and System Enumeration
- Guided Exercise: User and System Enumeration
- Guided Exercise: User and System Enumeration (Video)
- Windows Vulnerabilities
- Guided Exercise: Windows Vulnerabilities
- Guided Exercise: Windows Vulnerabilities (Video)
- Windows Password Cracking
- Guided Exercise: Password Cracking
- Guided Exercise: Password Cracking (Video)
- Privilege Escalation
- Clien-Side Attacks and SET (Social Engineering Toolkit)
- Lab: Attacking SMB
- Lab: Attacking SMB (Solution)
- User Enumeration
- Guided Exercise: User Enumeration
- Guided Exercise: User Enumeration (Video)
- Linux/Unix Service Enumeration
- Guided Exercise: Service Enumeration
- Guided Exercise: Service Enumeration (Video)
- Linux/Unix Vulnerabilities
- Privilege Escalation & Password Cracking
- Demo: Linux/Unix Privilege Escalation and Password Cracking
- Lab: Linux/Unix Vulnerabilities
- Lab: Linux/Unix Vulnerabilities (Solution)
- Web Protocols
- Web Servers
- Guided Exercise: Web Servers
- Guided Exercise: Web Servers (Video)
- Web Application Structure Discovery
- Cross Site Scripting (XSS)
- Guided Exercise: XSS
- Guided Exercise: XSS (Video)
- SQL Injection
- Guided Exercise: SQL injection
- Guided Exercise: SQL Injection (Video)
- Directory Traversal
- Guided Exercise: Directory Traversal
- Guided Exercise: Directory Traversal (Video)
- File Uploads
- Guided Exercise: File Uploads
- Guided Exercise: File Uploads (Video)
- Command Execution
- Guided Exercise: Command Execution
- Guided Exercise: Command Execution (Video)
- Microsoft SQL Server
- Oracle RDBMS
- MySQL
- Lab: Assessing Databases
- Lab: Assessing Databases (Solution)
- Msfvenom
- Clearev
- Lab: Maintaining Access
- Lab: Maintaining Access (Solution)
- Writing Pen Test Reports
- CTF Scenario
- TCP Ports
- UDP Ports
- Cheatsheet
- How to register for the exam
What is included in this course
-
High-quality videos with in-depth content
-
Modular structure – student-directed path
-
Knowledge Checks at end of each module and the course
-
eBook
-
Lab Guide including video Guided Exercises and answer files
-
6 months 24x7 remote access to a virtual lab
-
Instructor email support
-
1 exam voucher - Online Exam Proctoring
-
Digital Certificate of Completion
-
Pass your Exam and share your Accredible Badge on LinkedIn