Change Your Life With ICSI | Certified Penetration Tester Certificate Scholarship
Get up to 80% Scholarship

£500,000 worth of scolarships
Your pathway to a UK recognised degree in MSc Cybersecurity
HoursMinutesSeconds
bt_bb_section_bottom_section_coverage_image

Scholarship Eligibility Criteria:

  1. Applicants must be at least 18 years of age.
  2. Applicants must be African students.
  3. Annual income must be under GBP15,000.
  4. Background in information technology and/or cybersecurity is recommended.

Instructions:

To apply for the ICSI | Certified Penetration Tester Scholarship please follow the steps below:

Step 1:  Fill out the ICSI | Certified Penetration Tester Scholarship application form below

Step 2: Pay the GBP 5 – online verification fee, so we can confirm your identity

Step 3: You will be required to support Step 2 with an online identity verification at no extra charge

Your application will be reviewed by our admissions team and you will be advised approximately one week after your application. If you have any questions, please email customerservice@icsiglobal.com.

Step 1: Fill the ICSI | Certified Penetration Tester Scholarship Application - Step 1 of 3
By submitting this from I acknowledge that ICSI will collect and process information relating to me in accordance with the company Privacy Policy - https://icsiglobal.com/privacy-policy/ and agree to be contacted in relation to my enquiry.

Accreditation:

https://icsiglobal.com/wp-content/uploads/2022/03/crest-atp-320x197.png
https://icsiglobal.com/wp-content/uploads/2022/03/UCLan_Cyprus_logo_rgb-320x105.png
MSc Cybersecurity 20 Credits
What you will learn

Course: ICSI | CPT Certified Penetration Tester

This course is designed to teach how to perform penetration tests, how to think like an attacker and also demonstrates the tools needed to perform penetration testing.

Students will learn and perform information gathering, target discovery and enumeration, vulnerability mapping, system exploitation including Windows Domain attacks, and Azure AD (Active Directory), privilege escalation and maintaining access to compromised systems with over 40 detailed hands-on labs.

Module 1: Introduction to Kali Linux

Lessons:

  • Kali Linux History
  • Kali Linux Installation
  • Kali Linux Configuration
  • Basic Search Utilities

Labs:

  • Finding Files
  • Starting and Stopping Services

Module 2: Introduction to Penetration Testing

Lessons:

  • What is Penetration testing
  • Benefits of Penetration Testing
  • Vulnerability Scans
  • Methodologies
  • Ethical Issues
  • Legal Issues

Review Questions

Module 3: Standards

Lessons:

  • Penetration Testing Execution Standard (PTES)
  • PCI DSS
  • NIST 800-115
  • CREST UK
  • OWASP Top 10
  • ISO 27002

Review Questions

Module 4: Network Essentials

Lessons:

  • TCP/IP
  • IP Protocols
  • Network Architectures
  • Domain Name Server (DNS)
  • Management Protocols
  • Network Protocols
  • Using Netcat

Labs

  • Using Netcat

Module 5: Cryptography

Lessons:

  • Basics of Cryptography
  • History of Encryption
  • Symmetric Encryption
  • Asymmetric (Public Key) Encryption
  • Digital Signatures
  • Hashing
  • MAC and HMAC
  • Encoding
  • Password Crackers
  • Steganography
  • Cryptanalysis

Review Questions

Module 6: Scripting

Lessons:

  • Scripting
  • Windows PowerShell (Command Line Interface)
  • Linux Shell (Command Line Interface)

Labs:

  • Writing a Simple Bash Script

Module 7: Information Gathering

Lessons:

  • Passive Information Gathering
  • Registration Records
  • Google Searching
  • Active Information Gathering
  • DNS Enumeration
  • Host Discovery
  • Port and Operating System Discovery
  • Fingerprinting and Enumeration

Labs:

  • Using Shodan
  • DNS Enumeration
  • Host Discovery
  • Port and operating System Discovery
  • Fingerprinting and Enumeration
  • Information Gathering

Module 8: Vulnerability Assessment

Lessons:

  • Vulnerabilities
  • Packet Capture
  • Network Scanners
  • Nmap NSE
  • Metasploit Framework
  • Web Application Scanners

Labs:

  • Using Wireshark
  • Using OpenVas
  • Using Nmap Scripts
  • Using Metasploit Framework
  • Finding Vulnerabilities

Module 9: Reconnaissance and Exploitation of Windows Services

Lessons:

  • Important Windows Files
  • Windows Logs
  • The Registry
  • Active Directory Roles
  • Active Directory Database
  • Active Directory Reconnaissance
  • User and System Enumeration
  • Windows Vulnerabilities
  • Windows Privilege Escalation
  • Antivirus Evasion
  • Harvesting Credentials
  • Windows Password Cracking

Labs:

  • Active Directory Reconnaissance
  • User and System Enumeration
  • Windows Vulnerabilities
  • Windows Privilege Escalation
  • Evading Windows Defender
  • Responder
  • Dumping Credentials from Memory
  • Extract SAM File from Windows Registry
  • Attacking SMB

Module 10: Reconnaissance and Exploitation of Linux/UNIX Services

Lessons:

  • Linux Permissions Review
  • User Enumeration
  • Linux/Unix Service Enumeration
  • Linux/Unix Vulnerabilities
  • Linux Privilege Escalation
  • Linux/Unix Passwords

Labs

  • User Enumeration
  • Service Enumeration
  • Exploit ProFTP
  • Linux Privilege Escalation
  • Linux/Unix Vulnerabilities

Module 11: Reconnaissance and Exploitation of Web-Based Applications

Lessons:

  • Web Protocols
  • Web Servers
  • Web Application Structure Discovery
  • Cross-Site Scripting (XSS)
  • SQL Injection
  • Directory Traversal
  • File Uploads
  • Command Execution

Labs:

  • XSS
  • SQL Injection
  • Directory Traversal
  • File Uploads
  • Command Execution

Module 12: Databases

Lessons

  • Databases
  • Microsoft SQL Server
  • Oracle RDBMS
  • MySQL

Labs

  • Assessing Databases

Module 13: Lateral Movement

Lessons

  • Discovery
  • Windows Situational Awareness
  • Linux Situational Awareness
  • Lateral Movement

Labs

  • Pass the Hash
  • Port Forwarding

Module 14: Data Exfiltration

Lessons

  • Data from Local System
  • Data Exfiltration with Frameworks

Labs

  • Data Exfiltration with Metasploit

Module 15: Maintaining Access and Covering Tracks

Lessons

  • Persistence
  • Windows Persistence
  • Windows Persistence with Scheduled Tasks
  • .bash Startup File Manipulation
  • Local Job Scheduling
  • Linux Persistence by Adding User Accounts
  • Windows Persistence by Adding User Accounts

Labs

  • Maintaining Access

Module 16: Pen Testing Cloud Services (Azure)

Lessons

  • Introduction to Cloud Computing
  • Cloud Security
  • Threats and Attacks
  • Azure
  • Azure AD
  • Access Control
  • Attacking Azure with PowerZure

Labs

  • Attacking Azure
What students say about us
Kingsley ChinyamaMy experience at ICSI was very rewarding. I enrolled for a MasterPath Certificate CyberSecurity in June 2020. I started with the Penetration Testing certification (CPT) with one-to-one support and lecture videos. I was able to practice what I learnt using the CPT and CDFE Labs which were accessible 24/7. I also completed my certification in ISO27001 Lead Implementer and Digital Forensics which contributed greatly to my career growth as an Information Security Auditor at KPMG. The response time from the ICSI support is at another level, I call it an electrical response.
https://icsiglobal.com/wp-content/uploads/2022/02/Slide3-320x180.png
Arnold Ganga My experience with ICSI has been extremely rewarding. I enrolled with ICSI in May, 2021 for a MasterPath Certificate in cybersecurity. The course curriculum is enriching, practical and full of relevant content applicable in today’s ever evolving digital world. The practical exercises involve hands on labs, which allowed me to master cybersecurity skills. In addition, ICSI provides one on one classes, available for booking, with an ICSI instructor whenever I needed more articulation about the course content .After finishing the CPT and CDFE courses, I managed to secure a job as a tier one Security Operations Center Analyst. I’m so grateful to ICSI for providing me with the great opportunity to kick start my career in cybersecurity.
The average salary for a penetration tester is £49,188 per year in United Kingdom.
https://icsiglobal.com/wp-content/uploads/2022/02/shutterstock_755145436-1.png
bt_bb_section_bottom_section_coverage_image
0
    0
    Your Cart
    Your cart is emptyReturn to Shop