Cyber Scheme Team Member (CSTM)

Provided by

Enquire about this course

About the course

Cyber Scheme Team Member 
(CSTM)

 

Course Overview

In partnership with IRM, our five-day course is designed to help qualify penetration testers to test on government and commercial systems, which—alongside gaining security clearance—will support obtaining CHECK Team Member status. You will learn and practice current techniques used by industry qualified cyber-security penetration testers when conducting engagements in real world environments.

It includes the theory, as well as immersive, hands-on demonstrations and exercises to harness security testing skills in four days, with the fifth day dedicated to assessments. It can be delivered at the PGI Cyber Academy in Bristol or in some circumstances can be delivered at client premises for group bookings.

The course covers the following topics:

• Understand information security in the
corporate world
• Develop an understanding of ethics and
criminal law in relation to ethical hacking
• Understand the soft skills required by a
penetration tester
• Network device management and
exploitation
• Service enumeration
• Service topology/dependency mapping
• Service management and exploitation
• Application enumeration and profiling
• Application and operating system
management
• Application and operating system
exploitation and manipulation
• Conducting penetration testing
engagements.
• History of Hacking
• Risk and Risk Management
• Information Security Management Metrics
• Models of Information Security &
Security Standards
• The Law and Legalities associated with
Penetration Testing
• Cryptography
• Penetration Testing Methodology &
Scoping
• OSI 7 Layer Model
• Networking Fundamentals
• Recon & Information Gathering
• Port-scanning & Network Enumeration
• Common Security Issue 

Aim
Increase knowledge of current ethical hacking techniques using hands-on penetration testing skills in a safe environment, whilst gaining a qualification to progress to the CHECK Team Member status.

Who should attend?
You will have an in-depth knowledge of networking and the TCP protocol, as well as some familiarity or experience using the command line and Linux. This is also suitable for IT professionals who wish to understand ethical hacking techniques and perform tasks in vulnerable environments.

Learning objectives

  • Understand information security in the corporate world
  • Develop an understanding of ethics and criminal law in relation to ethical hacking
  • Understand the soft skills required by a penetration tester
  • Network device management and exploitation
  • Service enumeration
  • Service topology/dependency mapping
  • Service management and exploitation
  • Application enumeration and profiling
  • Application and operating system management
  • Application and operating system exploitation and manipulation
  • Conducting penetration testing engagements.

Enquire

Start date Location / delivery
18 Nov 2019 Bristol Book now

Related article

Cyber security – why bother? Most people’s perception of cyber-attacks are either of someone in a darkened room trying to take down web sites, or c...