Course CPT: Certified Penetration Tester

This course is already delivered, please contact us for the next available session tel:+357 22 44 14 92
Course Outline in PDF


This course teaches penetration testing and will illustrate how to think like an attacker and use industry standard tools to perform penetration testing. The course is aligned with the CREST CRT technical syllabus. Students will learn and perform the different phases of penetration testing assessments. The students will practice using Kali Linux and its tools to perform information gathering, target discovery and enumeration, vulnerability mapping, social engineering, system exploitation, privilege escalation, and maintaining access to compromised systems. The students will also learn to report the results of their assessments.

Who Should Attend:

This course will provide students with basic to intermediate knowledge in Ethical Hacking and Penetration Testing, significantly benefiting any professional who is involved in the area of Information Security as well as new individuals wanting to begin a career in IT Security. What is included: •eBook •Lab Guide •6 months 24x7 remote access to a virtual lab •1 exam voucher - Online Exam Proctoring •Certificate of Attendance (Digital)

Module 1: Introduction to Kali Linux

•Installing, configuring and updating Kali Linux
•Configuring Network Services

Module 2: Introduction to Pen Testing

•The need for Pen Testing
•Types of Pen Testing
•Methodology of Pen Testing
•Ethics and Compliance to Legal Systems

Module 3: Refreshing Network concepts

•TCP/IP •Netcat – TCP/IP Swiss Army Knife
•Sniffing Network Packets with Wireshark

Module 4: Information Gathering

•Basics of Information Gathering
•Use of Web Search Engines
•Domain Tools
•DNS Enumeration
•Hosts Discovery
•Port and Operating System Discovery
•Fingerprinting and Enumeration

Module 5: Vulnerability Mapping

•Vulnerability Research and Exploit Repositories
•Vulnerability assessment with OpenVAS Framework
•Using Nmap Scripting Engine (NSE)
•Metasploit Framework

Module 6: Reconnaissance and Exploitation of Windows Services

•Active Directory Reconnaissance
•User & System Enumeration
•Windows Vulnerabilities (mimikatz/Golden Ticket)
•Windows Passwords
•Password Cracking
•Privilege Escalation
•Client Side Attacks

Module 7: Reconnaissance and Exploitation of Linux/Unix Services

•User Enumeration
•FTP, SSH, Telnet, X11, R Services, RPC Services, SMTP
•Linux/Unix Vulnerabilities
•Privilege Escalation

Module 8: Reconnaissance and Exploitation of Web-Based Applications

•Web Protocols
•Web Servers
•Web Application Structure Discovery
•Cross Site Scripting (XSS)
•SQL Injection
•Directory Traversal
•File Uploads
•Code Injection

Module 9: Accessing Databases

•Microsoft SQL Server

Module 10: Maintaining Access & Covering Tracks


Module 11: Documentation & Reporting

•Writing Pen Testing Reports

Module 12: Capture the Flag workshop

In this workshop you will apply skills acquired during the course to conduct a full penetration test in an isolated environment.


The ICSI|CPT Certified Penetration Tester practical certification exam covers Hands-On material.
The exam duration is 3 hours. Passing Grade = 60%.
sd sd sd sd sd sd sd sd sd sd sd sd