Certified Penetration Testing Consultant (CPTC) – Perfil

Esquema Detallado del Curso

  • Module 1 – Penetration Testing Team Formation
  • Module 2 – NMAP Automation
  • Module 3 – Exploitation Process
  • Module 4 – Fuzzing with Spike
  • Module 5 – Simple Buffer Overflow
  • Module 6 – Stack Based Windows Buffer Overflow
  • Module 7 – Web Application Security and Exploitation
  • Module 8 – Linux Stack Smashing & Scanning
  • Module 9 – Linux Address Space Layout Randomization
  • Module 10 – Windows Exploit Protection
  • Module 11 – Getting Around SEH ASLR
  • Module 12 – Penetration Testing Report Writing