Qualified Security Team Member (QSTM)

Provided by

Enquire about this course

About the course

Qualified Security Team Member (QSTM)
 
Our five day Tiger Scheme Qualified Security Team Member course covers current techniques and associated skills used for ethical hacking and penetration testing. The course allows you to learn and practice current techniques used by industry qualified cyber-security penetration
testers when conducting engagements in real world environments. The course includes the theory, as well as immersive, hands-on demonstrations and exercises of security assessment
skills in four days, with the fifth day dedicated to assessments.
 
Aim
 
Increase knowledge of current ethical hacking techniques using hands-on
penetration testing skills in a safe environment, whilst gaining a qualification to progress to the CHECK Team Member status.
By taking the QSTM and demonstrating sufficient operation experience you can apply to become a CHECK Team Member.
 
Who Should Attend?
IT professionals who wish to understand ethical hacking techniques and perform tasks in vulnerable environments.
 

Prerequisites

It is recommended that you have an in-depth knowledge of networking and the TCP protocol, as well as some familiarity or experience using the command line and Linux.

Learning Objectives
  • Understand information security in the corporate world. 
  • Develop an understanding of ethics and criminal law in relation to ethical hacking
  • Understand the soft skills required by a penetration tester
  • Network device management and exploitation
  • Network enumeration and network mapping
  • Service enumeration
  • Service topology/dependency mapping
  • Service management and exploitation
  • Application enumeration and profiling
  • Application and operating system management
  • Application and operating system exploitation and manipulation
  • Conducting penetration testing engagements
  • The professionalism, communication skills, ethics and the law associated with penetration testing
  • Risk management
  • Required critical thinking when conducting security testing.
 

Enquire

Start date Location / delivery
No fixed date Bristol

Related article

Addressing The Weakest link John McGlone at The Training Centre outlines how you can address the weakest link in cybersecurity. Companies spend a s...