Overview
Overview
Thank you for reading this post, don't forget to subscribe!EC-Council’s Licensed Penetration Tester (LPT) certification is a natural evolution and extended value addition to its series of security related professional certifications. The LPT standardizes the knowledge base for penetration testing professionals by incorporating best practices followed by experienced experts in the field.
The objective of the LPT is to ensure that each professional licensed by EC-Council follows a strict code of ethics, is exposed to the best practices in the domain of penetration testing course and aware of all the compliance requirements required by the industry.
Unlike a normal security certification, the LPT is a program which trains security professionals to analyze the security posture of a network exhaustively and recommend corrective measures authoritatively. EC-Council’s license vouches for their professionalism and expertise thereby making these professionals more sought after by organizations and consulting firms globally.
Penetration Training Testing
Penetration Testing is a process of exploiting known vulnerabilities in a network. Most if not all government agencies around the globe test their network perimeter defense mechanisms continuously to ensure safe cyber boundaries. Cyber attacks did exist a decade ago but they did not create financial mayhem or threatened a nation’s economy to the level in which it is being seen today. Today, as organizations are increasingly becoming networked, information is being exchanged electronically at the speed of thought. Routine tasks rely on computing power for accessing, providing, and storing information. Today an organization’s lackadaisical information security posture may have a negative effect on its profitability or even its existence.
Audience Profile
The LPT program is designed for anyone who are involved penetration testing in the organization. System administrators, IT managers, IT Auditors, database professionals etc.
Prerequisite(s) Recommended
Certified Ethical Hacker (CEH)
Course Outline
Course Outline
Lesson 1: Penetration Testing Methodologies
Lesson 2: Customers and Legal Agreements
Lesson 3: Penetration Testing Planning and Scheduling
Lesson 4: Information Gathering
Lesson 5: Vulnerability Analysis
Lesson 6: External Penetration Testing
Lesson 7: Internal Network Penetration Testing
Lesson 8: Routers Penetration Testing
Lesson 9: Firewalls Penetration Testing
Lesson 10: Intrusion Detection System Penetration Testing
Lesson 11: Wireless Networks Penetration Testing
Lesson 12: Denial of Service Penetration Testing
Lesson 13: Password Cracking Penetration Testing
Lesson 14: Social Engineering Penetration Testing
Lesson 15: Stolen Laptop, PDAs and Cellphones Penetration Testing
Lesson 16: Application Penetration Testing
Lesson 17: Physical Security Penetration Testing
Lesson 18: Penetration Testing Report Analysis
Lesson 19: Penetration Testing Report and Documentation Writing
Lesson 20: Penetration Testing Deliverables and Conclusion
Lesson 21: Ethics and Conduct of a Licensed Penetration Tester