We are happy to advise you!
Contact
Certified Penetration Testing Consultant (CPTC) – Outline
Detailed Course Outline
- Module 1 – Penetration Testing Team Formation
- Module 2 – NMAP Automation
- Module 3 – Exploitation Process
- Module 4 – Fuzzing with Spike
- Module 5 – Simple Buffer Overflow
- Module 6 – Stack Based Windows Buffer Overflow
- Module 7 – Web Application Security and Exploitation
- Module 8 – Linux Stack Smashing & Scanning
- Module 9 – Linux Address Space Layout Randomization
- Module 10 – Windows Exploit Protection
- Module 11 – Getting Around SEH ASLR
- Module 12 – Penetration Testing Report Writing