Hands DOWN! The Best Pen Testing Certification! says USAF Red team There are other Pen Testing Licenses out there, but none validate your "Qualified" than SU's Q/PLT, says NASA.
The Q/SA- Q/PTL Qualified/ Security Analyst Penetration Tester certification class & Q/PTL Qualified/ Penetration Tester License validation lab prepares you to learn CNSS 4011, 4012, 4016A RED TEAM Training. It's"how to do Vulnerability Analysis" & "how to report" how compromised the network can be. You learn SU's Vulnerability Analysis & Penetration Testing process and methodology while doing "no harm".
The majority of the class consists of probing target networks, gaining user-level access and demonstrating just how compromised the network can be. SU teaches you the red team skills like leaving an innocuous file on a secure part of a network as a calling card, as if to say, “This is your friendly red team. We danced past the comical precautionary measures you call security hours ago. This file isn't doing anything, but if we were anywhere near as evil as the hackers we're simulating, it might just be deleting the very secrets you were supposed to be protecting. Have a nice day!”
How does SANS SEC560: Network Penetration and Ethical Hacking Course Different from the Q/SA - Q/PTL Qualified/Security Analyst vs CEH Certified Ethical Hacker Course?
Below is a comparison of these three penetration testing & hacking courses:
SANS Network Penetration Testing vs Q/SA- Q/PTL vs CEH (Certified Ethical Hacker)
Provides an entry-level knowledge of penetration testing
Provides an step by step process and methodology of Penetration Testing
Develops security testing skills using live pen testing target range
Analyzes how penetration testing and ethical hacking fit into a qualified information security program
Focuses on skill development and provides in-depth, technical skills for experienced pen testers
Provides in-depth understanding of the most powerful and useful pen testing tools and how they interrelate
Addresses real-world strategies and tactics to avoid common pen test pitfalls and maximize efficiency of testing
Discusses how to define appropriate rules of engagement and build a pen test project scope
Focuses on penetration test workflow and step-by-step methods for conducting projects
Learns how to do pen testing step by step with secrets from industry experts
Emphasizes the mindset of successful penetration testing and ethical hacking, including troubleshooting, weighing risks, following a proven process, documentation, and final reports based on business risk
Covers techniques for maximizing the value of a pen test through thorough reporting and business focus
Ensures experienced instructors with real-world pen testing experience
Culminates in a hands-on penetration test of an example target organization modeling real-world security flaws
Qualifies and validate the penetration tester skills based on a 3 hr live penetration test compete with report back to management.
The Q/SA® - Q/PTL® is the only performanced based security skills assessment certification that validates your Qualified/ Security Analyst Penetration Tester skills.
What is Q/ISP?
Q/ISP Certification is obtained through Security University for the purpose of recognizing qualified individuals who have distinguished themselves as knowledgeable and proficient information security practitioners with validated hands-on tactical security skills. The Q/ISP certificate also provides THE only means of identifying and certifying qualified persons who subscribe to a rigorous requirement for maintaining their knowledge and proficiency in information security with "validated" their hands-on tactical security skills.
Certification is awarded to those qualified individuals who validate their security skills to a prescribed qualified level of tactical hands-on information security experience, comply with a professional code of ethics, and pass rigorous examinations on the Q/ISP Body of Knowledge for information security.
Keeping your Q/ISP Valid
In order to maintain currency in the field, each Q/ISP must complete participation in research or study, attendance at recognized subject-matter training and professional educational programs, presentation or publication of information security papers, contributions to the information security Q/ISP Body of Knowledge, or service in professional organizations. Each Q/SIP must acquire 120 CPE continuing professional education credits every three years. (40 credits per year)
In order to use a Qualified Q/ISP Trustmark the Q/ISP has validated their tactical security skills by completing the Tactical Security Certification Practical's from the Q/PTL, Q/FE & Q/ND classes.
Download the 2012 SU Computer Security Class Roadmap
Qualified Training for Qualified Results
Q/SA® Qualified/ Security Analyst Penetration Tester class & Q/PTL® License is much higher on the security pyramid of Security Analysis & Network Penetration Testing Skills Classes and Certifications. We set the bar to provide you tactical security skills including:
Security Analysis and Penetration Testing Process & Methodology
Latest exploit goals and methodologies
Understanding the mind set needed to perform penetration testing
Advanced information-gathering techniques
Expert network discovery tools and techniques
Identifying & exploiting network weaknesses with Core Impact and more tools
Advanced enumeration of network devices, platforms and protocols
Cracking contemporary authentication and authorization
Advanced router, firewall and IDS testing \ Exploiting IPS
Vulnerability research and automated scanning in the enterprise
Exploits & tools
Scanning for root kits, trojans, malware and viruses
Tools for web application testing - Watchfire Appscan and freeware tools
Exploiting complex protocols, such as SSH, SSL, and IPSEC
Using payload generators
Advanced wireless testing tools and techniques
Advanced wireless testing tools and techniques AirCrack-NG
Penetration testing and the law
You'll learn how to gather viable data on your network & network vulnerabilities using leading edge tools like Nessus , GFI Landguard and Hyena, SOLAR WIND S, NMAP. During your testing you will learn how to use Exploitation tools like MetaSploit, Saint Scanner / SaintExploit tool , CORE IMPACT from Core Security, NIKTO & Open Source tools.
Penetration concepts you will master during this hands on class
Attacking network infrastructure devices
Hacking by brute forcing remotely
Security testing methodologies
Security exploit testing with IMPACT from Core Security
Stealthy network recon
Remote root vulnerability exploitation
Multi-OS banner grabbing
Privilege escalation hacking
Unauthorized data extraction
Breaking IP-based ACLs via spoofing
Evidence removal and anti-forensics
Hacking Web Applications
Breaking into databases with SQL Injection
Cross Site Scripting hacking
Remote access trojan hacking
Justifying a penetration test to management and customers
Instructor-led hands-on lab exercises
Capture the Flag hacking exercises
Abusing DNS for host identification
Leaking system information from Unix and Windows
Unix, Windows and Cisco password cracking
Data mining authentication information from clear-text protocols
Malicious event log editing
Harvesting web application data
Data retrieval with SQL Injection Hacking
Phase I Gather the Data A first look at a network site, from the eyes of a potential hacker. The simple, and often overlooked, things that tell hackers if a site is worth a penetration attempt.
Phase II Penetrate the Network How hackers get past the security and into the data. Non-intrusive target search
Intrusive target search
Data analysis Network Discovery Tools and Techniques: Hands-On Exercises Discovery/profiling objectives
Locating Internet connections
Host-locating techniques: manual and automated
Operating system footprinting
Evaluating Windows and Unix-based network discovery software tools
Evaluating Windows and Unix-based application scanning software tools
Review Step-by-step process of each scanning and profiling tool
Directory services: DNS, DHCP, BOOTP, NIS
Look-up services: finger, whois, search engines
Remote sessions: telnet, "r" commands, X-Windows
File sharing and messaging: FTP, TFTP, World Wide Web
Windows Server Message Block (SMB), Network File
Systems (NFS), and e-mail
Sample exploits using common TCP/IP and NetBIOS utility software
The Q/SA® & Q/PTL® materials address common pitfalls in penetration testing and ethical hacking projects, with real-world targets and to maximize the quality of test results. Daily complex scenarios and capture the flag exercises increase your tactical skills.
Learn timesaving tactics based on years of tactical security experiences from real penetration testers and ethical hackers defeating a problem in minutes.
We stress the mind-set of successful penetration testers and ethical hackers and balance skills with "outside-the-box" thinking, a penetration methodology that stands the test of time and carefully weighing risks, and creating a quality final report for management
You analyze how penetration testing and ethical hacking fits into a comprehensive information security & assurance program.
Phase III Analyze the Results Tips and techniques for effective, actionable penetration test analysis.
Identifying network services
Demonstrating risks and escalating permissions
Reviewing reports and screens from prominent discovery/profiling tools
Analyzing current configuration Real-World Scenarios Abusive e-mail
Phase IV Write the Report How to combine methodology, results, and analysis into a report that generates management attention and buy-in and provides clear, workable action items. In-Class Exercises for your Q/PTL® Validation "Qualification" • Building and maintaining a target list
• Conducting multiple non-intrusive and intrusive target searches
• Tools and techniques for testing for Web site vulnerabilities
• Probing and attacking network firewall's
• Performing multiple remote target assessment
• Performing multiple host assessment
• Validating vulnerabilities
• Writing up the final report
• Prepares you for the Q/PTL validation " Practical" Exam
10 years ago Security University started training security professionals with the very best penetration step by step process and methodology class, SU is still the leader in security Analysis & Penetration Testing Certifications in the industry. Security University Q/SA® class is CNSS-approved.
Now you can take the same Penetration Testing process and methodology class that trains the US Air Force, Army, Navy and Marines trained to defend military networks. Your class is taught by SSME (Security Subject Matter Experts) who know the "Art of Penetration Testing & Hacking". You'll gain serious tactical security skills that will set you apart from your peers.
As an Army Information Systems Management (FA53) officer focusing on Cyber Defense, I've had the opportunity to train and certify in several IA/CND specific programs as well as work a myriad of Army Cyber Defense workforce training and development issues.
Having just recently completed the Security University (SU) Qualified Security Analyst (Q|SA) and Qualified Penetration Tester License (Q|PTL) courses I can confidently say that Sondra and her team have built an exceptional program of instruction; capturing the essential elements of security analysis and penetration testing methodologies and delivering them in a clear and concise format in a blended learning environment of lecture and hands-on practical skill development with scenario-based final examinations. SU training techniques are a perfect match for our military cyber defense workforce goals since they not only train the relevant concepts of cyber defense and its CND specialties but also in the case of Q|SA and Q|PTL courses challenge the students to apply those concepts in a "tactical" setting that an actual security analyst or penetration tester might see.
Security University's Q|SA / Q|PTL program of instruction is impressive and superior to some other training programs in several ways; one of them being the daily hands-on assessment of critical skills being taught. Another was the realistic practical final exam which included a penetration test with a final report that required some in-depth analysis of the resulting sets of data. I spent 30 post-course hours alone on analyzing the data and developing a 32 page report. That's definitely an experience you're not going to get through other training programs that teach a five day curriculum that's predominately lecture based. The Q|SA and Q|PTL courses also expose the students to a wide range of open and closed source automated tools for use in security analysis and penetration testing as well as the built-in assessment and exploitation capabilities of both Linux and Windows based operating systems. I honestly can't understand how we expect to conduct defense in depth across the GiG without our technical workforce understanding basic exploitation, which is exactly what's missing from many other approved certifications. SU equally balances this with methodology and analysis techniques rather than relying on specific toolsets since tools frequently change and are always subject to interpretation of their results.
IDS Log Analysis,
IPS & IDS correlation,
IDS & IPD countermeasures,
What is a Q/ISP® "Qualified" Information Security Professional Certification? The 125 question online Q/ISP certification exam has questions from 4 Q/ISP Security Skills certification prep classes:
Qualified/Security Analysis Penetration Testing
The Q/ISP, Q/EH, Q/SA- Q/PTL, Q/FE & Q/ND certification exams do not require training classes.
The Q/ISP certification is selected to be reviewed for 8570 certification list & awaiting NOCA's new assessment based certification approval.
What is a "Qualified" Q/ISP? A Qualified Q/ISP has attained 4 SU Q/ISP® Validation Certifications. Each Validation Certification is attained by attending the Q/ISP tactical security skills certification prep class to validates your tactical security skills - Q/EH, Q/SA - Q/PT License, Q/FE & Q/ND. Each validation & certification prep class is 5 days of hands-on labs, with an online certification exam AND a intense hands-on "Practical" exams. You have to pass both the On-line certification exam and the "Practical" validation projects before you earn a SU Q/ISP (Validation) Certification.
The Security University Security Pyramid represents enlightenment, man's breaking free of stagnant education and reaching towards the supreme source of security skills training and validation, globally illuminating risk preparedness.
Prior to 2008, if you attended Security University's EC-Council® Authorized CEH®, ECSA®,CHFI® classes and passed the exams you are eligible for the Q/ISP® Qualified Certifications but still have to pass the Q/ISP certification exam.
Compliance requirements aside, penetration testing is an absolutely critical aspect of any security program. Attackers test every company's defenses every day.
The Q/ISP Qualified/ Information Security Professional Certification Program has been selected as finalists for SC Magazine's Best Professional Security Training Program 2009. Click here to view the press release
The ECSA™/LPT™ Certification is provided exclusively by EC-Council® and its ATC's, Security University is not sponsored by, approved by, or affiliated in any way with EC-Council®.