SOFNET
Certified Penetration Tester (CPT)
Organizations are increasingly taking proactive defense measures that
effectively minimize their risk of data breaches and financial losses.
As a Certified Penetration Tester, you will be able to master that art of conducting penetration test, identify and address vulnerabilities fortify defenses, and mitigate cyber threats effectively.
COACH
20+ Years Experience
HYBRID CLASSES
Face-to-Face / Online Classes
DURATION
5 Days
CERTIFICATION BY
HRD CORP REGISTERED TRAINING PROVIDER
HRD CORP CLAIMBABLE
Penetration Testing with Certified Examination
The CPT examination is certified by the Global ACE Certification designed to align with a set of relevant Knowledge, Skills and Attitudes (KSA) that are necessary for an Information security Awareness Manager.
Empowering IT Personnel with practical skills in conducting cutting-edge vulnerability assessments and executing penetration tests across diverse systems and networks.
Proactive Defense Approach by identifying, addressing, and fortifying vulnerabilities to counter potential cybersecurity threats.
University-backed Curriculum
Relevant to the Real World Practices
CERTIFICATION OF COMPLETION
BECOME A CYBERSECURITY CRTP EXPERT IN
5 Days
What You’ll Learn
Learn to comprehend hacker
attack strategies, conduct
thorough vulnerability
assessments and prepare
penetration test reports.
Preventive & Proactive Security
- Vulnerability Assessment & Testing
- Information Intelligence Techniques
- Cracking & Social Engineering
- PowerShell Exploitation
- Web Pentest
- Wireless Pentest
In-Depth Training and Extensive
Cybersecurity Modules
Explore detailed insights into the MITRE ATT&CK Framework, focusing on threat actors’ techniques, tactics, and procedures (TTPs) crucial for Red Teaming.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Pioneering Over 20-Years Of IT
Expertise & Cybersecurity
Meet Dr. Clement Arul
Dr. Clement Arul is a seasoned IT professional with 20- years of experience, specializing in cybersecurity framework, ethical hacking, security risk & governance, big data, IoT, systems analysis (design, development, secure coding, implementation), digital forensics, and project management. He has made significant contributions to national cybersecurity frameworks and has collaborated with multiple ASEAN governments to develop and implement their cybersecurity strategies. Dr. Arul’s expertise is widely recognized, with his active participation in 600+ public conferences across ASEAN in recent years.
Get Funded & Learn New Skills
Our cybersecurity program is fully reimbursable through HRD Corp.
Allows you to gain access to high-quality training at no extra cost!
Take advantage of this financial flexibility to invest in your professional career today.
Our graduate testimonials
Adam Smith
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Jhon Deo
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Maria Mak
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Jackma Kalin
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Amily Moalin
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.