Center for Qualified CyberSecurity Excellence & Mastery

"Where Qualified Cyber Education Happens"

Q/SA® Qualified/ Security Analyst Penetration Tester (non-degree certification)
& Q/PTL® Workshop in 5 days!

Hands DOWN! The Best Pen Testing Certification! says USAF Red team
There are other Pen Testing Licenses out there, but none validate your "Qualified" than SU's Q/PLT, says NASA.

The Q/SA- Q/PTL Qualified/ Security Analyst Penetration Tester certification class & Q/PTL Qualified/ Penetration Tester License validation lab prepares you to learn CNSS 4011, 4012, 4016A RED TEAM Training. It's"how to do Vulnerability Analysis" & "how to report" how compromised the network can be. You learn SU's Vulnerability Analysis & Penetration Testing process and methodology while doing "no harm".

The majority of the class consists of probing target networks, gaining user-level access and demonstrating just how compromised the network can be. SU teaches you the red team skills like leaving an innocuous file on a secure part of a network as a calling card, as if to say, “This is your friendly red team. We danced past the comical precautionary measures you call security hours ago. This file isn't doing anything, but if we were anywhere near as evil as the hackers we're simulating, it might just be deleting the very secrets you were supposed to be protecting. Have a nice day!”

How does SANS SEC560: Network Penetration and Ethical Hacking Course Different from the Q/SA - Q/PTL Qualified/Security Analyst vs CEH Certified Ethical Hacker Course?

Below is a comparison of these three penetration testing & hacking courses:

SANS Network Penetration Testing vs Q/SA- Q/PTL vs CEH (Certified Ethical Hacker)

Topics

SANS

CEH

Q/SA Q/PTL

Provides an entry-level knowledge of penetration testing

--

X

X

Provides an step by step process and methodology of Penetration Testing

--

--

X

Develops security testing skills using live pen testing target range

X

--

X

Analyzes how penetration testing and ethical hacking fit into a qualified information security program

--

--

X

Focuses on skill development and provides in-depth, technical skills for experienced pen testers

X

--

X

Provides in-depth understanding of the most powerful and useful pen testing tools and how they interrelate

X

--

X

Addresses real-world strategies and tactics to avoid common pen test pitfalls and maximize efficiency of testing

X

--


X

Discusses how to define appropriate rules of engagement and build a pen test project scope

X

--

X

Focuses on penetration test workflow and step-by-step methods for conducting projects

X

--

X

Learns how to do pen testing step by step with secrets from industry experts

--

--

X

Emphasizes the mindset of successful penetration testing and ethical hacking, including troubleshooting, weighing risks, following a proven process, documentation, and final reports based on business risk

X

--

X

Covers techniques for maximizing the value of a pen test through thorough reporting and business focus

X

--

X

Ensures experienced instructors with real-world pen testing experience

X

--

X

Culminates in a hands-on penetration test of an example target organization modeling real-world security flaws

X

--

X

Qualifies and validate the penetration tester skills based on a 3 hr live penetration test compete with report back to management. ( since 1999)

--

--

X

The Q/SA® - Q/PTL® is the only performance based security skills assessment certification that validates your Qualified/ Security Analyst Penetration Tester skills.

What is SUT Q/ISP Certificate?

SUT Q/ISP Certification is obtained through SU for the purpose of recognizing qualified individuals who have distinguished themselves as knowledgeable and proficient information security practitioners with validated hands-on cybersecurity skills. The SUT Q/ISP certificate identifies certified ying qualified persons who subscribe to a rigorous requirement for maintaining their knowledge and proficiency in information security with "validated" their hands-on tactical security skills.

Certification is awarded to those qualified individuals who validate their security skills to a prescribed qualified level of tactical hands-on information security experience, comply with a professional code of ethics, and pass rigorous examinations on the Q/ISP Body of Knowledge for information security.

Keeping your Q/ISP Valid

In order to maintain currency in the field, each Q/ISP must complete participation in research or study, attendance at recognized subject-matter training and professional educational programs, presentation or publication of information security papers, contributions to the information security Q/ISP Body of Knowledge, or service in professional organizations. Each Q/ISP must acquire 216 CPE continuing professional education credits every three years. (72 credits per year)

In order to use a Qualified Q/ISP Trustmark the Q/ISP has validated their tactical security skills by completing the Tactical Security Certification Practical's from the Q/PTL, Q/FE & Q/ND classes.

<
Class Fee $2,995 + 1/2 price for Q/PTL( $1,500 off !) $4,500 for class+ Practical
Time: 7:45 am 4pm, 4pm --8 pm (4 hr labs Tues- Thur)
Location: Click here to view the class schedule
Prerequisites: Understanding of TCP/IP protocols
CPE Credits: 72 Q/SA + 30 for Q/PTL
Instructor: Highly qualified instructor with
CEH/ Q/EH®, Q/SA®
Q/SA EXAM Vouchers incl in class fee

Method of Delivery - Residential On Ground
Method of Evaluation: 1. 95 % attendance 2. 100 % completion of Lab
Grading: Pass = 95% Attendance and 100% Completion of Labs and Practical
Fail => 95% Attendance and > 100% Completion of Labs and Practical


CORE IMPACT from Core Security 8IP, 7-day eval LICENSE with every class registration! a $25,000 value - only at Security University!


SAINT Exploit tool

Who should attend:


Download the SU Computer Security Class Roadmap

Qualified Training for Qualified Results

Q/SA® Qualified/ Security Analyst Penetration Tester class & Q/PTL® License is much higher on the security pyramid of Security Analysis & Network Penetration Testing Skills Classes and Certifications. We set the bar to provide you tactical security skills including:

You'll learn how to gather viable data on your network & network vulnerabilities using leading edge tools like Nessus , GFI Landguard and Hyena, SOLAR WIND S, NMAP. During your testing you will learn how to use Exploitation tools like MetaSploit, Saint Scanner / SaintExploit tool , CORE IMPACT from Core Security, NIKTO & Open Source tools.

Penetration concepts you will master during this hands on class

  • Attacking network infrastructure devices
  • Hacking by brute forcing remotely
  • Security testing methodologies
  • Security exploit testing with IMPACT from Core Security
  • Stealthy network recon
  • Remote root vulnerability exploitation
  • Multi-OS banner grabbing
  • Privilege escalation hacking
  • Unauthorized data extraction
  • Breaking IP-based ACLs via spoofing
  • Evidence removal and anti-forensics
  • Hacking Web Applications
  • Breaking into databases with SQL Injection
  • Cross Site Scripting hacking
  • Remote access trojan hacking
  • Offensive sniffing
  • Justifying a penetration test to management and customers
  • Defensive techniques

Instructor-led hands-on lab exercises

  • Capture the Flag hacking exercises
  • Abusing DNS for host identification
  • Leaking system information from Unix and Windows
  • Stealthy Recon
  • Unix, Windows and Cisco password cracking
  • Data mining authentication information from clear-text protocols
  • Remote sniffing
  • Malicious event log editing
  • Harvesting web application data
  • Data retrieval with SQL Injection Hacking

Phase I — Gather the Data
A first look at a network site, from the eyes of a potential hacker. The simple, and often overlooked, things that tell hackers if a site is worth a penetration attempt.

Phase II — Penetrate the Network
How hackers get past the security and into the data.

Network Discovery Tools and Techniques: Hands-On Exercises

The Q/SA® & Q/PTL® materials address common pitfalls in penetration testing and ethical hacking projects, with real-world targets and to maximize the quality of test results. Daily complex scenarios and capture the flag exercises increase your tactical skills.

Phase III — Analyze the Results

Tips and techniques for effective, actionable penetration test analysis.

Real-World Scenarios

Phase IV — Write the Report

How to combine methodology, results, and analysis into a report that generates management attention and buy-in… and provides clear, workable action items.


In-Class Exercises for your Q/PTL® Validation "Qualification"

10 years ago Security University started training security professionals with the very best penetration step by step process and methodology class, SU is still the leader in security Analysis & Penetration Testing Certifications in the industry. Security University Q/SA® class is CNSS-approved.

Now you can take the same Penetration Testing process and methodology class that trains the US Air Force, Army, Navy and Marines trained to defend military networks. Your class is taught by SSME (Security Subject Matter Experts) who know the "Art of Penetration Testing & Hacking". You'll gain serious tactical security skills that will set you apart from your peers.

As an Army Information Systems Management (FA53) officer focusing on Cyber Defense, I've had the opportunity to train and certify in several IA/CND specific programs as well as work a myriad of Army Cyber Defense workforce training and development issues.

Having just recently completed the Security University (SU) Qualified Security Analyst (Q|SA) and Qualified Penetration Tester License (Q|PTL) courses I can confidently say that Sondra and her team have built an exceptional program of instruction; capturing the essential elements of security analysis and penetration testing methodologies and delivering them in a clear and concise format in a blended learning environment of lecture and hands-on practical skill development with scenario-based final examinations. SU training techniques are a perfect match for our military cyber defense workforce goals since they not only train the relevant concepts of cyber defense and its CND specialties but also in the case of Q|SA and Q|PTL courses challenge the students to apply those concepts in a "tactical" setting that an actual security analyst or penetration tester might see.

Security University's Q|SA / Q|PTL program of instruction is impressive and superior to some other training programs in several ways; one of them being the daily hands-on assessment of critical skills being taught. Another was the realistic practical final exam which included a penetration test with a final report that required some in-depth analysis of the resulting sets of data. I spent 30 post-course hours alone on analyzing the data and developing a 32 page report. That's definitely an experience you're not going to get through other training programs that teach a five day curriculum that's predominately lecture based. The Q|SA and Q|PTL courses also expose the students to a wide range of open and closed source automated tools for use in security analysis and penetration testing as well as the built-in assessment and exploitation capabilities of both Linux and Windows based operating systems. I honestly can't understand how we expect to conduct defense in depth across the GiG without our technical workforce understanding basic exploitation, which is exactly what's missing from many other approved certifications. SU equally balances this with methodology and analysis techniques rather than relying on specific toolsets since tools frequently change and are always subject to interpretation of their results.

Appendix I,II,III

Packet Filtering, IDS Log Analysis, Vulnerability, Log Analysis, IPS & IDS correlation, IDS & IPD countermeasures, Wireless Security, Software Security, Network Security, Event Correlation, Threat Mgt, Security Polices, Virus Malware,
Code Review, Reverse Engineering, COOP, Incident Response, C&A

What is a Q/ISP® "Qualified" Information Security Professional Certification?

The 125 question online Q/ISP certification exam has questions from 4 Q/ISP Security Skills certification prep classes:
Qualified/Ethical Hacking
Qualified/Security Analysis Penetration Testing
Qualified/Forensics Expert
Qualified/Network Defense

The Q/ISP, Q/EH, Q/SA- Q/PTL, Q/FE & Q/ND certification exams do not require training classes.
The Q/ISP certification is selected to be reviewed for 8570 certification list & awaiting NOCA's new assessment based certification approval.

What is a "Qualified" Q/ISP?

A Qualified Q/ISP has attained 4 SU Q/ISP® Validation Certifications. Each Validation Certification is attained by attending the Q/ISP tactical security skills certification prep class to validates your tactical security skills - Q/EH, Q/SA - Q/PT License, Q/FE & Q/ND. Each validation & certification prep class is 5 days of hands-on labs, with an online certification exam AND a intense hands-on "Practical" exams. You have to pass both the On-line certification exam and the "Practical" validation projects before you earn a SU Q/ISP (Validation) Certification.

The Security University Security Pyramid represents enlightenment, man's breaking free of stagnant education and reaching towards the supreme source of security skills training and validation, globally illuminating risk preparedness.

Prior to 2008, if you attended Security University's EC-Council® Authorized CEH®, ECSA®,CHFI® classes and passed the exams you are eligible for the Q/ISP® Qualified Certifications but still have to pass the Q/ISP certification exam.

Since 2004 SU has certified over 3500 ECSA™/ Q/SA® Qualified Security Analysts Penetration Testers in 7 countries!

Customize your Q/SA® Q/PTL training program today!
  US Congress wants hack teams for self-penetration download for more..

Compliance requirements aside, penetration testing is an absolutely critical aspect of any security program. Attackers test every company's defenses every day.

Legal Notice:
The ECSA™/LPT™ Certification is provided exclusively by EC-Council® and its ATC's, Security University is not sponsored by, approved by, or affiliated in any way with EC-Council.