EC-Council's LPT is a course that is continued after completing CEH and ECSA , it is a stardard of penetration tester with the best practice of penetration testing
It is a stardard of penetration tester with the best practice of penetration testing
"What you have learned is a mere handful; What you haven't learned is the size of the world"-Avvaiyar,tamil poet
LPT is an advance to expert level certification, a license that is valid for 2 years. With enormous amount of knowledge in LPT, people can be sure that they are the top notch in the security field.
Ā
Ā
Ā
All our consultants are senior professional with tremendous exposure to Information Security and Governance Risk & Compliance. With over a decade of experience in training & consulting, they help bring a lot of practical and industry relevant examples with case studies to the classroom which improves the overall learning experience. Our professional hold industry acclaimed accreditation such as : Phd , M.S , CISSP, CHFI, CISA, CISM, CEH, ISO 27001 LI / LA, CCNP, CWNA , MCSE & ITIL.
Ā
Ā
Ā
infySEC IS Lab is an extreme Online Virtual Remote Lab provided to participants where they can work from any place at any point of time without restriction. ISLab provides login privilege to Certified Ethical Cracker participants where they can work in our Virtual Remote Server and start doing their Labs.
Our ISLab was created in such a concept called āLearn with Funā where each participant will face gaming-like structured online hacking program called 'Live Hacking Zone' which contains many Levels relevant to the topics covered on the program. Each participant has to cross levels to face CEC exam, Hence CEc will only deliver equipped candidates. Participant have to cross multiple Levels starting with easy to toughest level. Each participant can track other participants activity live which helps each participants to get involved into Live Hacking Zone competition, Prepare to be SHOCKED, ENTERTAINED and EDUCATED all at the same time.
those who have completedĀ
The content of infySEC syllabuses is regularly updated to ensure that it remains relevant and reflects the latest thinking in par with the scenario of current technology . However, as part of the latest review, the documents themselves have been given a fresh design.
FLOW OF LPTĀ COURSE
Ā
S.No | TOPICS |
1 | CEH and ECSA |
2 | Penetration testing |
3 | External Penetration testing |
4 | Internal network Penetration testing |
5 | Routers and Switches |
6 | Firewall |
7 | IDS |
8 | Wireless |
9 | Denial of Service |
10 | Password Cracking |
11 | Social engineering |
12 | Stolen laptop, PDA's and cell phones |
13 | Application |
14 | Physical security |
15 | Database |
16 | VoIP |
17 | VPN |
18 | War Dialing |
19 | Virus and Trogans Detections |
20 | Log management |
21 | File Integrity Checking |
22 | Bluetooth and hand held device |
23 | Telecommunications and broadband |
24 | Email security |
25 | Security Patches |
26 | Data Leakage |
27 | Penetration testing deliverables and conclutions |
28 | Penetration testing report and documentation writing |
29 | Penetration testing report analysis |
30 | Post testing action |
31 | Ethics of licensed Penetration tester |
32 | Standards and compliance. |