Course Outline CSTA
Course Outline CSTA
Course Outline CSTA
ETHICAL HACKING EC
UR
ITY TES
TI
N
G
S
Certified Security
AS
RT I F I E D
S O C I AT E
Testing Associate (CSTA)
CE
•
•
ET
HI G
C AL IN
H AC K
industry sectors looking to The various stages of that attack, or exploits and vulnerabilities
equally a penetration test, are explored zzImprove your ability to respond
develop their own
from initial information gathering, target effectively to cyber threats
capability to support their scanning and enumeration through to zzValuable preparation and hands-on
organisation’s in-house gaining access, exploitation, privilege practice in preparation for the CREST
cyber team. escalation and retaining access. Practical Registered Penetration Tester (CRT)
in-depth hands-on exercises using examination
various tools reinforce the theory as you
experiment with a Windows 2012 domain WHO SHOULD ATTEND
I found it all very (server and workstation) plus a Linux The course is ideally suited to anyone
interesting, the hardware server. looking to improve their career prospects
and software system was or transitioning into a cyber security role,
excellent; everything The course demonstrates cyber-attack including:
worked as planned. The techniques but this is always done with zzNetwork engineers
experience using a range of tools to zzCan you name a layer 2 and layer 3
zzOnce you are able to identify and zzCan you describe at a high-level how a
To find out if our cyber training is right for you, or to make a booking,
call our education team on 01763 285 285 or email
[email protected]
COURSE OUTLINE
ETHICAL HACKING EC
UR
ITY TES
TI
N
G
S
Certified Security
AS
RT I F I E D
S O C I AT E
Testing Associate (CSTA)
CE
•
•
ET
HI G
C AL IN
H AC K