Hacking 101 Check Point Certified PenTesting Associate (CCPA)

Hacking 101 Check Point Certified PenTesting Associate (CCPA) Certification Training Course Overview

Overview

A 1-day course that will teach you the foundations of penetration testing and how to find and exploit vulnerabilities within different technologies. This introductory course will train attendees in understanding Pen Testing, and provide background information on risks and vulnerabilities associated with different systems and provide insight to how the mindset of a hacker works. 

Target Audience 

  • System Administrators
  • Web Developers
  • IT Managers
  • Security enthusiasts
  • Anyone interested in Pen Testing and ethical hacking.
Learning Objective 
  • Systems
  • Networks
  • Web
  • Applications
  • Reverse software engineering

Hacking 101 Check Point Certified PenTesting Associate (CCPA) (8 Hours) Download Course Contents

Live Virtual Classroom
Group Training 550
25 Oct 09:00 AM - 05:00 PM CST
(8 Hours/Day)

22 Nov GTR 09:00 AM - 05:00 PM CST
(8 Hours/Day)

06 Dec 09:00 AM - 05:00 PM CST
(8 Hours/Day)

1-on-1 Training (GTR) 650
4 Hours
8 Hours
Week Days
Weekend

Start Time : At any time

12 AM
12 PM

GTR=Guaranteed to Run
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Special Solutions for Corporate Clients! Click here
Hire Our Trainers! Click here

Course Modules

Module 1: HACKING FUNDAMENTALS
  • Hacking History 101
  • Hacking in 2018
  • CIA Triad
  • Art of Hacking Methodology
  • Introduction to Kali Linux
Module 2: NETWORK SECURITY
  • Network Fundamentals
  • MAC Addressing and Network Addressing
  • Introduction to Port Addressing
  • Understanding the OSI Layer and TCP/IP Model
  • Domain Name System (DNS) Attack Surface
  • TCP vs UDP
  • Network Scanning
  • Shodan
Module 3: LINUX SECURITY
  • Introduction to Linux
  • Linux Filesystem Hierarchy
  • Linux File Permissions
  • Berkeley Rsh/Rlogin Services
  • Network File System (NFS) Security
  • Missing Security Patches
  • Vulnerability Identification
  • Case Study: Shellshock
  • Introduction to Metasploit
Module 4: WINDOWS SECURITY
  • Windows Fundamentals
  • Windows Password Hashing
  • Workgroups vs Domains
  • Windows Authentication
  • Windows Exploitation 101
  • Client-Side attacks
  • Case Study: WannaCry
Module 5: HACKING CMS SOFTWARE
  • Introduction to Content Management Systems
  • Enumerating CMS Platforms
  • Hacking WordPress
  • Joomla Exploitation
Module 6: WEB SECURITY
  • HTTP Protocol Basics
  • Understanding Web Application Attack Surface
  • SQL Injection
  • Case Study: T alkT alk SQL Injection
  • Command Injection
  • Cross-Site Scripting (XSS)
  • Open Redirect
Module 7: WIRELESS SECURITY
  • WiFi Security 101
  • Wired Equivalent Privacy (WEP)
  • Wi-Fi Protected Access (WPA)
  • WPA2 Security
  • Wi-Fi Protected Setup (WPS) flaws
  • Rogue Access Points Attacks
Download Course Contents

Request More Information

Course Prerequisites
  • Basic Computer Knowledge.