CREST - CRT Certification (Registered Penetration Tester)

Hack into computers and networks effectively

Requirements:
  • At least one year of network or server administration experience

Who is the course for

Porovnat s ostatními kurzy

The course is ideal for intermediate cyber security professionals who are interested in practicing their skills and improving the techniques needed to perform their security testing duties.

The course is suitable for:

  • Ethical hackers

  • Penetration testers

  • Cyber Security Specialists

  • Cyber Security Consultants

  • Information security specialists

What will you learn

More information
  • Assess the resilience of security systems
  • Create and present concise technical documentation
  • Use tools, techniques and procedures to remotely create persistence on a target
  • Conduct offensive and defensive operations for exercise, assessment and vulnerability detection purposes

Terms

Currency
Term
Place
Length
Language
Price without VAT

No results match the specified filters

Loading...

Do you want this course individually?

Let us know!

This course can be customized - either as an individual training 1:1 or for your team. Just leave us your contact and we will contact you with options tailored to your needs.

Successfully sent

We will contact you.

Timeline

1st Day

09:00 – 17:00 Information Gathering
  • Network Mapping and Target Identification; OS Fingerprinting; Application Fingerprinting and Evaluating Unknown; ServicesFile System Permissions; Domain Name System; Management Protocols

2nd Day

09:00 – 17:00 Windows Services, Enumerations and Exploitations
  • Domain Reconnaissance; System Users Enumeration; Windows Active Directory; Common Windows Application and Windows Vulnerability

3rd Day

09:00 – 17:00 Linux Services, Enumerations and Exploitations
  • User Enumeration; Unix Vulnerabilities; FTP Security Assessment; Sendmail / SMTP; Network File System (NFS); R* Services; X11 Service; RPC services; SSH

4th Day

09:00 – 17:00 Web Application Technologies and their Vulnerabilities
  • Web Site Structure Discovery; Web Servers & their Flaws; Websites and Application Servers; Structure Discovery; Cross Site Scripting Attacks; SQL Injection

5th Day

09:00 – 17:00 Database Enumeration and Vulnerabilities
  • MySQL Database; MS SQL Database; Oracle Database; Oracle RDBMS
  • CRT Practice Exam Preparation PGI Assessment
  • Block length 90
  • Teaching hours 40
  • Refreshments No
  • Exam No

Na konci tohoto školení budete schopni prokazatelně využívat nové i stávající dovednosti k efektivnímu a profesionálnímu pronikání do počítačových systémů nebo sítí – za použití realistických technik hrozeb – k vyhodnocení jejich zabezpečení a odhalování potenciálních zranitelností.

Prestigious certification included

Registered Penetration Tester

The Council of Registered Ethical Security Testers (CREST) is a recognized organization that sets high standards for information security, and its certifications are considered the gold standard in the industry.

Registered Penetration Tester (CRT) is an internationally recognized and prestigious certification in the field of cyber security, especially in the context of penetration testing and ethical hacking.

Certification instructions

Exam format

Time limit: 2 hours

Pass mark: 72/120 (60%)

Format: Multiple choice, closed book

Frequently asked questions

All questions

Who is a white hacker?

A white hacker is a person who performs security testing, penetration testing, and other forms of security analysis to discover and fix vulnerabilities and weaknesses in systems, applications, and networks.

Unlike black hackers (hackers who focus on illegal activities such as data theft, malicious hacking, etc.), a white hacker works in accordance with laws and ethical standards.