logo

Licensed Penetration Tester (LPT) Master Bootcamp (EC6171)

EC-Council LPT Master - Eccentrix

Licensed Penetration Tester (LPT) - the highest level of certification from EC-Council in intrusion and penetration testing. One of the most recognized cybersecurity programs in the world.

Our training roadmap is offering the most important topics to master in the domain of ethical hacking. All of it providing knowledge that is a direct preparation to the certification exam - an exam based on a practical and complex lab scenario, with an intrusion methodology aimed at demonstrating your rigourous experience in the multiple challenges presented. 18 hours are allowed to get through nine challenges, divided in three levels of difficulty.

During the training, conceived steps will provide a comprehensive knowledge on offensive security for the ultimate objective - help you achieve your exam and become a Licensed Penetration Tester (LPT) Master!

EC-Council LPT Master - EccentrixEC-Council LPT Master - EccentrixEC-Council LPT Master - EccentrixEC-Council LPT Master - EccentrixEC-Council LPT Master - EccentrixEC-Council LPT Master - Eccentrix

Our topics are presented through three different known EC-Council trainings:

LPT

Applicable solutions

Public class

Virtual classroom
Planned datePlanned date
October 23 2023
$12595$
 
English
Virtual classroom
Planned datePlanned date
December 4 2023
$12595$
 
English
Virtual classroom
Planned datePlanned date
January 15 2024
$12595$
 
English
Virtual classroom
Planned datePlanned date
February 26 2024
$12595$
 
English
12595$
Duration: 
15 days / 105 hours

Private class

On site / Virtual classroom
Minimum no. of participants: 5
15 days / 105 hours
Price on request
English or French
Training plan: 

Course 1: Certified Network Defender (CNDv2) (CS6156)

The Certified Network Defender (CNDv2) course is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and to the Department of Defense (DoD) job roles for system/network administrators.

The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and white papers for additional learning.

Module 01: Network Attacks and Defense Strategies

Module 02: Administrative Network Security

Module 03: Technical Network Security

Module 04: Network Perimeter Security

Module 05: Endpoint Security-Windows Systems

Module 06: Endpoint Security-Linux Systems

Module 07: Endpoint Security- Mobile Devices

Module 08: Endpoint Security-IoT Devices

Module 09: Administrative Application Security

Module 10: Data Security

Module 11: Enterprise Virtual Network Security

Module 12: Enterprise Cloud Network Security

Module 13: Enterprise Wireless Network Security

Module 14: Network Traffic Monitoring and Analysis

Module 15: Network Logs Monitoring and Analysis

Module 16: Incident Response and Forensic Investigation

Module 17: Business Continuity and Disaster Recovery

Module 18: Risk Anticipation with Risk Management

Module 19: Threat Assessment with Attack Surface Analysis

Module 20: Threat Prediction with Cyber Threat Intelligence

Course 2: Certified Ethical Hacker (CEHv12) (CS6154)

The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v12 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”

CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. You will be exposed to an entirely different posture towards the responsibilities and measures required to be secure.

Module 01: Introduction to Ethical Hacking

Module 02: Footprinting and Reconnaissance

Module 03: Scanning Networks

Module 04: Enumeration

Module 05: Vulnerability Analysis

Module 06: System Hacking

Module 07: Malware Threats

Module 08: Sniffing

Module 09: Social Engineering

Module 10: Denial-of-Service

Module 11: Session Hijacking

Module 12: Evading IDS, Firewalls, and Honeypots

Module 13: Hacking Web Servers

Module 14: Hacking Web Applications

Module 15: SQL Injection

Module 16: Hacking Wireless Networks

Module 17: Hacking Mobile Platforms

Module 18: IoT and OT Hacking

Module 19: Cloud Computing

Module 20: Cryptography

Course 3: Certified Penetration Tester Professional (CPENT) (CS6158)

EC-Council’s Certified Penetration Tester (CPENT) program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, CPENT’s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.

Module 01: Introduction to Penetration Testing

Module 02: Penetration Testing Scoping and Engagement

Module 03: Open Source Intelligence (OSINT)

Module 04: Social Engineering Penetration Testing

Module 05: Network Penetration Testing – External

Module 06: Network Penetration Testing– Internal

Module 07: Network Penetration Testing – Perimeter Devices

Module 08: Web Application Penetration Testing

Module 09: Wireless Penetration Testing

Module 10: IoT Penetration Testing

Module 11: OT/SCADA Penetration Testing

Module 12: Cloud Penetration Testing

Module 13: Binary Analysis and Exploitation

Module 14: Report Writing and Post Testing Actions

Exclusives: 
  • One year access to the class recording
  • 180 days access to the lab environment after class 
  • Three vouchers to take the exams online
  • One year subscription to the CodeRed platform containing thousands of cybersecurity videos
  • Practice exam questions (CND and CEH)
  • Course material accessible in electronic format
  • Official EC-Council Certificate of Attendance
Prerequisites: 
  • Knowledge of the operation of client and server operating systems (file systems, permissions, Windows security, Linux, etc.).
  • Basic knowledge of network protocols, for example TCP / IP.
  • General notions of server roles and services present in a network.
Certification information: 
  • Exam characteristics:
    • 3 blocks of 6 hours
    • Practical exam with lab 
    • Proctored online
    • Validity: 2 years
    • Annual renewal fee: 250 US
  • Exam description:

The exam will require you to demonstrate mastery of deploying advanced pen testing techniques and tools including multi-level pivoting, OS vulnerabilities exploits, SSH tunnelling, host-based application exploits, privilege escalation, web server and web application exploitation such as arbitrary local and remote file upload, SQL injection and parameter manipulation, etc – all in a real life scenario on hardened machines, networks, and applications.

You will be facing the ticking clock and there’s no time to hesitate. There’s no time for second-guessing. Try either of these and be prepared to fail!

And you must know that while you are racing against time, you will be under the watchful eyes of the EC-Council proctors who will be online and live! This added pressure will test your mental strength.

Contact us for more information on pricing::

Eccentrix
Office: 1-888-718-9732
E-mail: info@eccentrix.ca

130, King Street West, Suite 1800
Toronto, Ontario M5X 1E3
www.eccentrix.ca