ETHICAL HACKER AND
PENETRATION TESTER
TACTICAL BOOTCAMP
TESTEMANAGEMENT Vertical Technology
Type Professional development
Sub-Category Security
3
Hello there
You've considered embarking on an exciting journey to
strengthen your professional status and career trajectory. The
choice to obtain professional certification and/or further
credentials in the subject matter area that you choose to
specialise in, puts a powerful tool, right in your hands.
It will bring you competitive edge, career progression and
market opportunity.
This brochure will provide further information about the
course of your choice. There is a wide selection of other
courses on our website, a selection that is constantly added
and improved upon. Feel free to email or call us if you need
help with anything.
We welcome the chance to be part of your journey.
Sincerely
Rowena Morais
Programme Director
Welcome Note
Rowena Morais
Programme Director
2
3
Course Information
Rowena Morais
Programme Director
Course Overview
Rowena Morais
Programme Director
Five day course. This is how you Push Back! Shore up your defence … and get on the offensive and win the fight against cyber attacks. Drills run by the EC Council Instructor Of The Year and a member of its Circle Of Excellence. A hugely hands on experience, you will get an overview of IT security from a penetration tester’s perspective. You will review different techniques and proof of concept of attacks. You will get the low-down on all the fundamentals required such as collecting information on the target, the attack itself, post-attack and how to cover your tracks.
Curriculum
Rowena Morais
Programme Director
Module 01 Fundamentals of IT Security and Penetration Testing (Pentesting) (Allowing for the fact that you may come from different backgrounds and skill levels, this module presents the baseline knowledge needed. You will learn the fundamentals of IT security; the IT Security element (Confidentially, Integrity and Availability - CIA); the need for penetration testing; documentation; reporting; and presentation. Topics include IT Security Fundamentals; Pentesting types; Pentesting steps; and the first step in the Pentesting steps ie Footprinting/Information Gathering). Module 02 Scanning, Attacks and Post Attacks (This module covers technique as well as proof of concept in attacking. After collecting the information of the target, we learn how to attack and post-attack behaviour. You will be given 80 percent hands on/practical to carry out various attacks/pentests and post attacks, including remotely installing a backdoor, spyware and keylogger. You will learn how to see what others cannot see. Topics include Network Scanning; Port Scanning Types; Vulnerability Scanning; Password Cracking; Server side Attacks; Client side Attacks, Evading or bypassing the firewall; and Covering your tracks).
2015 Courses
Rowena Morais
Programme Director
INFORMATION TECHNOLOGY
HUMAN RESOURCE
Certificate of Cloud Security Knowledge
CompTIA Cloud Essentials
CompTIA Virtualization Essentials
TOGAF® 9
Professional Scrum Master
Professional Scrum Developer
Professional Scrum Product Owner
Certified Lean Kanban Foundation
Certified in the Governance of Enterprise IT
COBIT 5 Foundation
Certified in Risk and Information Systems
Control
Certified Professional in Health IT
ISTQB® Advanced Test Manager
ISTQB®Advanced Test Analyst
ISTQB® Advanced Technical Test Analyst
iSQI® Certified Agile Tester
ITIL® Lifecycle- Service Strategy
ITIL® Lifecycle- Service Operation
ITIL® Lifecycle - Service Transition
ITIL® Lifecycle - Service Design
ISTQB® Foundation
Certified Wireless Network Administrator
Certified Wireless Analysis Professional
Certified Wireless Design Professional
Certified Wireless Security Professional
Transitioning to Agile
How to Implement Practical Data Quality
Management
more
Change Management Foundation
Certified Mentor Practitioner (Level 1)
The Language of Effective
Presentations.
3
Course Information
Rowena Morais
Programme Director
Module 03 Application and Web Application Attacks (This session covers application attacks including how to debug a custom application, how to locate holes in applications and how to write the exploit code or script as well as attacking the most popular type of application nowadays, web applications. You will learn hands-on how to deal with web application vulnerabilities based on OWASP ( Open Source Web Application Security Project) Top 10 attacks. Topics include Buffer Overflow; Application Debugging; Writing your Own Exploit Code; Web Application Attack; SQL Injection and Simple and Blind SQL Injection; Cross Site Scripting and Local and Remote File Inclusion; Cookie Stealing; Parameter Manipulation; Directory Traversal; With or without Automatic Web Application Scanner.
Module 04 Other Attacks/PenTesting Vectors (You will discover that attacks and pentesting do not only concern application or system attacks but can also result from other IT infrastructure such as wireless attacks. You will conduct hands-on attacks at the network layer (which is now also the most dangerous type of attack), such as DHCP Attack, ARP and DNS Poisining, Sniffing or data interception, and Distributed Denial of Service (DDOS) attack.
Locations
Rowena Morais
Programme Director
rmorais@verticaldistinct.
com
Geographies covered :
Middle East | Asia Pacific |
Africa
Complete and updated list of
all cities and dates are
available on
www.verticaldistinct.com
4
Module 05 PenTesting Challenge/Simulation (Optional) (You will be given the task of doing a simulation exercise on a few vulnerable servers and will need to create a report and relevant documentation, which will be subject to review later).
Belly Rachdianto
Belly Rachdianto has been delivering IT security courses in Indonesia, Malaysia, Singapore, Hong Kong, Myanmar and Sri Lanka for both local and multinational companies including Dell, Microsoft, IBM, Intel, Maybank, CIMB Bank, Shell, Macao Police Department, Singtel and more.
Faculty
Having worked on an extensive array of large-scale, mission-critical projects, systems integration, network design and implementation as well as security assessment, Belly has deep skill and experience in all aspects of network operating systems platforms, internetworking devices, security and multi-service network convergence. He has won the Instructor of the Year award in 2014 as well as the "Circle of Excellence" Instructor award from 2010 - 2012 from EC Council USA.
5
engineer at Concentra.
As a consultant, he was a project lead on over a dozen projects spanning the manufacturing, healthcare, oil & gas, internet, banking & finance, and education verticals. His experience included projects at Fortune 500 and Global 1000 companies such as GE Medical Systems, BP Amoco, and William Blair. In addition to consulting, he has worked part-time as a corporate trainer and obtained certifications in Java (SCJP, SCJD) and Microsoft technologies (MCP+SiteBuilding). He has certifications in CIO, eCommerce, Data Warehousing and Business Intelligence.
6
Additional Information
Prerequisites
None applicable.
Target
audience
General security
practitioners, penetration
testers, ethical hackers, web
application developers and
website designers and
architects.
Important
Note
1. Laptop required (Either a
Windows, Linux or Mac
computer with the following
minimum hardware
requirements : CPU 2.0+
processor, 8GB RAM or
higher, 125GB free hard disk
space, USB port, DVD rom
drive and wired LAN and high
speed internet connection ).
2. Terms and conditions
apply. Please visit Vertical
Distinct for the full terms.
Learning
Aims
You will learn all the main concepts and techniques to become a Penetration Tester. This includes understanding the ethics, theory and practical aspects involved, understanding what happens
in ‘real world’ cases and undergoing a simulation exercise using the latest techniques and types of attack in IT Security in an offensive way.
7
Testimonials
Rowena Morais
Programme Director
Belly has completed some of the hardest computer security exams on the planet. This simply is not possible unless you have an amazing amount of discipline, passion, persistence and love for what you do. There is no question in my mind that Belly cannot achieve what he sets out to accomplish. Leo Dregier (CISSP, CEH, CHRI, CISO+), CEO/Problem Solver/PMP/Trainer at TheCodeOfLearning.com
I had the opportunity to acquire my Certified Ethical Hacker training from Belly and it was an experience I cherish forever. I was completely overwhelmed by the command he had over the latest tools and techniques in the security domain. His elevated knowledge and versatility in all aspects of info security gave me an insight as to how learned, professional and enriched his experience was. Khurram Javed, Assistant Director, Riphah Institute of Systems Engineering (RISE)
Belly is a great and knowledgeable trainer. I was pleased to be part of his class for Certified Ethical Hacker v8 and I strongly recommend Belly if you would like to proceed for your next certification. He is a proactive and tireless guy who doesn’t hesitate to share new ideas for network exploitation. Ehsan Hashemi (CEH), IT Security and Compliance Specialist at Aegis Malaysia
Visit our website
Check out Vertical Distinct' Profile
Preview Accelerate Magazine, a publication of Vertical Distinct.
VERTICAL DISTINCT SDN BHD Suite 1208 Level 12 Amcorp Tower, Amcorp Trade Centre
No. 18 Persiaran Barat, 46050 Petaling Jaya, Selangor Darul Ehsan, Malaysia.
+603 7948 5241 +603 7955 6363 [email protected]
www.verticaldistinct.com