Oops! It appears that you have disabled your Javascript. In order for you to see this page as it is meant to appear, we ask that you please re-enable your Javascript!
page preloader

Penetration Testing Training Course - LPT (Master)

LPT Banner


Introduction

EC-Council Certified Security Analyst (ECSA V8) complements the Certified Ethical Hacker (CEH) certification by exploring the analytical phase of ethical hacking. While CEH exposes the learner to hacking tools and technologies, ECSA V8 takes it a step further by exploring how to analyze the outcome from these tools and technologies. Through groundbreaking penetration testing methods and techniques, ECSA V8 class helps students perform the intensive assessments required to effectively identify and mitigate risks to the security of the infrastructure. The objective of a Licensed Penetration Tester is to ensure that each professional licensed by EC-Council follows a strict code of ethics, is exposed to the best practices in the domain of penetration testing and aware of all compliance requirements required by the industry.

Course Objective

LPT has evolved into the industry accepted standard for penetration testing and it is based on the best practices that industry experts follow. Jay Bavisi created the LPT certification for EC-Council as a means to hold all EC-Council licensed professionals to a uniform code of ethics and provide regular compliance updates within the industry. Due to the strict standards with which EC-Council holds its LPTs, organizations actively seek out these professionals before any other penetration tester.

Prerequisites

  • Before attending this course, students should have five year of experience managing Windows/Unix/Linux systems or have equivalent knowledge and skills.
  • Good Understanding of TCP/IP is required.
  • It is recommended that CEH and CHFI is done before LPT/ECSA.

Syllabus

  • The Need for Security Analysis
  • Advanced Googling
  • TCP/IP Packet Analysis
  • Advanced Sniffing Techniques
  • Vulnerability Analysis with Nessus
  • Advanced Wireless Testing
  • Designing a DMZ
  • Snort Analysis
  • Log Analysis
  • Advanced Exploits and Tools
  • Pen Testing Methodologies
  • Customers and Legal Agreements
  • Rules of Engagement
  • Penetration Testing Planning and Scheduling
  • Pre Penetration Testing Checklist
  • Information Gathering
  • Vulnerability Analysis
  • External Penetration Testing
  • Internal Network Penetration Testing
  • Routers and Switches Penetration Testing
  • Firewall Penetration Testing
  • IDS Penetration Testing
  • Wireless Network Penetration Testing
  • Denial of Service Penetration Testing
  • Password Cracking Penetration Testing
  • Social Engineering Penetration Testing
  • Stolen Laptop, PDAs and Cell phones Penetration Testing
  • Application Penetration Testing
  • Physical Security Penetration Testing
  • Database Penetration testing
  • VoIP Penetration Testing
  • VPN Penetration Testing
  • War Dialing
  • Virus and Trojan Detection
  • Log Management Penetration Testing
  • File Integrity Checking
  • Blue Tooth and Hand held Device Penetration Testing
  • Telecommunication and Broadband Communication Penetration Testing
  • Email Security Penetration Testing
  • Security Patches Penetration Testing
  • Data Leakage Penetration Testing
  • Penetration Testing Deliverables and Conclusion
  • Penetration Testing Report and Documentation Writing
  • Penetration Testing Report Analysis
  • Post Testing Actions
  • Ethics of a Licensed Penetration Tester
  • Standards and Compliance

Related Courses

  • ECSA (EC-Council Certified Security Analyst)

    EC-Council Certified Security Analyst (ECSA V8) complements the Certified Ethical Hacker (CEH) certification by exploring the analytical phase of ethical hacking. While CEH exposes the learner to hacking tools and technologies, ECSA V8 takes it a step further by exploring how to analyze the outcome from these tools and technologies. Through groundbreaking penetration testing methods and techniques, ECSA V8 class helps students perform the intensive assessments required to effectively identify and mitigate risks to the security of the infrastructure. The objective of a Licensed Penetration Tester is to ensure that each professional licensed by EC-Council follows a strict code of ethics, is exposed to the best practices in the domain of penetration testing and aware of all compliance requirements required by the industry.
    Read More
  • CHFI (Computer Hacking Forensic Investigator)

    CHFI Course certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. Computer Hacking Forensic Investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud.
    Read More

Enquire Now