Professional & Academic
TigerScheme, Senior (Check Team Leader)
The Senior level qualification (Check Team Leader) is based on a written paper, a multiple choice paper, a six hour 'assault course' practical assessment, and an interview during which the candidate is asked to explain their findings from the practical assessment. The multiple choice paper is used by the assessor not only to examine the knowledge possessed by the candidate, but also to direct attention to areas of potential weakness to be examined in the practical and the viva. This is a rigorous examination, and should be attempted only by individuals with a significant degree (3 to 5 years) of practical experience.
GIAC, GIAC Penetration Tester (GPEN)
The GPEN certification is for security personnel whose job duties involve assessing target networks and systems to find security vulnerabilities. Certification objectives include penetration-testing methodologies, the legal issues surrounding penetration testing and how to properly conduct a penetration test as well as best practice technical and non-technical techniques specific to conduct a penetration test.
CREST, CREST Registered Penetration Tester
CREST provides an entry level Registered Tester examination. This examination is recognised by CESG as providing the minimum standard for CHECK Team Member status and is designed to assess a candidate’s ability to carry out basic vulnerability assessment and penetration testing tasks.
EC-Council, Certified Ethical Hacker (CEH)
The most advanced ethical hacking course in the world that covers cutting edge of hacking technology. EC-Council researchers go deep underground covertly to extract advanced attacks and exploits. They analyze how hackers operate and present detailed illustrated hacking methodologies to defence community.
7Safe, HIM Hacking Insight for Managers
This 1 day course is ideally suited to anyone requiring a high-level understanding of hacking techniques and current trends without the need for practical know-how. This course introduces the basic technical concepts behind the various stages of a hacking attack, as well as some common tools and techniques used by hackers and security professionals alike.
7Safe, CMST Mobile Application Hacking: Hands-On
7Safe's 3-day mobile application hacking training course is designed to provide developers and ethical hackers with the fundamentals of mobile application security, detailing the most common vulnerabilities and how to identify them.
7Safe, CSTP Ethical Web Application Hacking: Hands-On
This 2-day web application ethical hacking course covers the fundamentals of the industry-recognised OWASP Top Ten – to quote OWASP: “the ten most critical web application security risks”. You will have access to a functional ASP.NET and PHP application through which theory is reinforced by way of practical exercises.
7Safe, CSTA Ethical Hacking: Hands-On
This 4-day ethical hacking training course is a hands-on journey into the hacking mindset, examining and practically applying the tools and techniques that hackers use to launch "infrastructure" attacks.
OFFENSIVE SECURITY, Penetration Testing Training with Kali Linux
This unique penetration testing training course introduces students to the latest ethical hacking tools and techniques, including remote virtual penetration testing labs for practicing the course materials. Penetration Testing with Kali Linux simulates a full penetration test from start to finish, by injecting the student into a target-rich, diverse, and vulnerable network environment.
SANS, SEC560: Network Penetration Testing and Ethical Hacking
As a cyber security professional, you have a unique responsibility to find and understand your organization's vulnerabilities, and to work diligently to mitigate them before the bad guys pounce. Are you ready? SANS SEC560, our flagship course for penetration testing, fully arms you to address this duty head-on.
EC-Council, Penetration Testing Training Course – LPT
While the Certified Ethical Hacker course teaches an individual what are the threat agents that can compromise the security posture of an organization and the EC-Council Security Analyst program provides a repeatable and documentable methodology that can be used by a security auditor while analyzing the security status of the organization, the Licensed Penetration Tester exam covers a completely different skill-set that is needed by every penetration tester – Report Writing.