Gain the advanced skills to become a Certified Penetration Testing Consultant, mastering network infrastructure and protocol attacks for IT security professionals targeting large corporate environments.
Design effective penetration testing strategies for complex network infrastructures.
Implement advanced techniques for Layer2, Layer3, and VPN attacks.
Analyze network traffic using cutting-edge tools to identify vulnerabilities.
Understand and apply methods to evade IDS/IPS and implement secure protocols.
The vendor neutral Certified Penetration Testing Consultant course is designed for IT Security Professionals and IT Network Administrators who are interested in conducting Penetration tests against large network infrastructures similar to large corporate networks, Services Providers and Telecommunication Companies. Instead of focusing on operating system level penetration testing, this course covers techniques on how to attack and prevent underlying network infrastructure and protocols. The training starts from basic packet capturing and analyzing by using both commercial and open source tools. From there, the student continues with Layer2 attack vectors, Layer3 based attacks; including both IPv4 and IPv6 stacks, routing protocol attacks (OSPF, BGP, etc) and then hops over to service provider level attacks related with very common used MPLS, how to use relays and pivots, VPN attacks including IPSEC protocol suite, and SSL attacks. Finally, the class will cover NIDS/NIPS evasion and implementation techniques. This course uses in-depth lab exercises after each module. Students may spend 16 hours+ performing labs that emulate a real world Pen Testing model. Students will make use of scores of traditional and cutting edge Pen Testing tools (GUI and command line, Windows and Linux) as they make their way through mile2’s time-tested methodology. Mile2 Accreditations:
No upcoming dates. Please check back later.
Packet capturing using libpcap
Capturing using ncap
Packet Capturing Software
Windump / TCPDump Usage
Wireshark General Settings
Capture Options Menu Shortcuts
Packet Reassembly
Capturing VOIP Calls
FBI/CSI Risk Assessment
Different Types of attacks
Switch Learning Process
Excessive Flooding
Mac Flooding
Spanning Tree Basics
VLAN Hopping Attack
ARP Spoofing Attack Tools
BGP Route Injection
DDoS detection and prevention
MPLS Router integrity checking
Netcat Backdoors
Persistent Listeners
Simple Netcat Relay
ICMPv6 Neighbor Discovery
DAD DoS Attack
IPv6 Attack Tools
IPSec Detection
Main Mode PSK Cracking
IKE-Scan Techniques
Setting up IPTABLES
SSLSTRIP Technique
Certificate Revocation
Evasion Networking Standards
Fragmentation-Based Techniques
Sending Overlapping Fragments
Javascript Evasions
Your team deserves training as unique as they are.
Let us tailor the course to your needs at no extra cost.
Trusted by Engineers at:
and more...
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier