Certified Penetration Tester Associate (CPTA)

This course teaches the fundamentals of the Linux Operating System including networking and penetration testing. The course will demonstrate the basics of practical penetration testing with the use of industry standard tools. The course is aligned with the CREST CRT technical syllabus.

Course Structure: 30% Theory, 70% Hands on
Duration: 1 year
Credits: 1 credit

Examination & Certification:

  • Two multiple choice exams plus assignments
  • ICSI|CPTA Certified Penetration Tester Associate Certificate
  • Additional LPI.org Certification

Letter Grades

A+ 97%+ C 73-76.9%
A 93-96.9% C- 70-72.9%
A- 90-92.9% D+ 67-69.9%
B+ 87-89.9% D 63-66.9%
B 83-86.9% D- 60-62.9%
B- 80-82.9% F 0-59.9%
C+ 77-79.9%

Overview

This course teaches the fundamentals of the Linux Operating System including networking and penetration testing. The course will demonstrate the basics of practical penetration testing with the use of industry standard tools. The course is aligned with the CREST CRT technical syllabus.

The course is divided into two sections:

Section 1 (Quarter 1 – Quarter 2):
Students will learn the Essentials of Linux Administration including networking.

Section 2 (Quarter 3 – Quarter 4):
Students will learn and perform the different phases of penetration testing assessments. The students will practice using Kali Linux and its tools to perform information gathering, target discovery and enumeration, vulnerability mapping, social engineering, system exploitation and privilege escalation.

All exercises unless noted otherwise are performed in an isolated online hosted testing lab.

Who Should Attend:
This course will significantly benefit students who are involved in the areas of Information Security as well as new individuals wanting to begin a career in IT Security penetration testing.

The demand for the (cybersecurity) workforce is expected to rise to 6 million
(globally) by 2019, with a projected shortfall of 1.5 million.”Michael Brown, CEO at Symantec The world’s largest security software vendor.

What is provided:

  • Learning Management System
  • Hosted Virtual Environment with access to multiple Operating Systems
  • In class Trainer
  • Books, Guides and Exercises
  • Exams and Assignments

For any additional information please contact George Mousouros gmousouros@aisc.ac.cy

Download the Course outline