Licensed Penetration Tester

 

Licensed Penetration Tester (LPT) is a natural evolution and extended value addition to its series of security related professional certifications. The LPT standardizes the knowledge base for penetration testing professionals by incorporating best practices followed by experienced experts in the field. The objective of the LPT is to ensure that each professional licensed by EC-Council follows a strict code of ethics, is exposed to the best practices in the domain of penetration testing and aware of all the compliance requirements required by the industry.

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.

LPT Requirements

  • Achieve the EC-Council Certified Security Analyst (ECSA) Certification..
  • Pass the online LPT practical exam. The exam is conducted over the EC-Council’s state-of-the-art iLabs platform..
  • Please note that processing time will take between 2-4 weeks after all requirements above are submitted by the applicant..

Benefits

  • EC-Council's prestigious endorsement as a licensed penetration testing professional, allowing successful candidates to practise penetration testing and consulting internationally.
  • Industry acceptance as a legal and ethical security professional..
  • Access to proprietary EC-Council software, templates and penetration testing methodologies.
  • License to practice and conduct security testing in organizations accredited by EC-Council.
  • Acquire knowledge from experienced hands-on penetration testing methodologies and latest penetration testing practices..
  • International Ignite Training Certification and Global Certification from EC-Council + 2 years free membership of IGNITE.
  • Training under the interactive and lab intensive environment equips the professionals with in-depth knowledge, practical experience of network security and exposure to latest hacking technologies..
  • The course tools and programs are preloaded on the iLabs machine that saves productive time and effort.
  • The professionals can validate their potentials of being an expert in security systems..
  • Learning from the experienced and leading experts, the participants are exposed to the real-life hacking techniques.
  • A Certified Ethical Hacker is always in demand by government organizations, private firms, banks, financial institutions, military establishments, etc.

Complete Package details for Indian & International Students

  • Official Training by certified instructors.
  • Head-2-Head training by Certified Subject matter experts.
  • Highly interactive lectures, group exercises, and review sessions
  • Intensive Hands-on Training.
  • 2 years membership of Ignite international training group
  • Chance to become country representative for Ignite.
  • Certification Exam Fees Included..
  • Individual study environment
  • Training Environment.
  • Practical live hacking
  • Concept based training
  • 24/7 High speed internet connectivity
  • Limited candidates in class
  • Module 01: The Need for Security Analysis
  • Module 02: Advanced Googling.
  • Module 03: TCP/IP Packet Analysis
  • Module 04: Advanced Sniffing Techniques.
  • Module 05: Vulnerability Analysis with Nessus
  • Module 06: Advanced Wireless Testing.
  • Module 07: Designing a DMZ.
  • Module 08: Snort Analysis
  • Module 09: Log Analysis.
  • Module 10: Advanced Exploits and Tools
  • Module 11: Pen Testing Methodologies
  • Module 12: Customers and Legal Agreements
  • Module 13: Rules of Engagement
  • Module 14: Penetration Testing Planning and Scheduling
  • Module 15: Pre Penetration Testing Checklist
  • Module 16: Information Gathering
  • Module 17: Vulnerability Analysis
  • Module 18: External Penetration Testing
  • Module 19: Internal Network Penetration Testing
  • Module 20: Routers and Switches Penetration Testing
  • Module 21: Firewall Penetration Testing
  • Module 22: IDS Penetration Testing
  • Module 23: Wireless Network Penetration Testing
  • Module 24: Denial of Service Penetration Testing
  • Module 25: Password Cracking Penetration Testing
  • Module 26: Social Engineering Penetration Testing
  • Module 27: Stolen Laptop, PDAs and Cell phones Penetration Testing
  • Module 28: Application Penetration Testing
  • Module 29: Physical Security Penetration Testing
  • Module 30: Database Penetration testing