89
CREST CPSA Exam Preparation Course Introduction
How to Book One to One Trainer Online Meeting
1.1 Engagement Lifecycle (A1)
1.2 Law and Compliance (A2)
1.3 Scoping (A3)
1.4 Understanding, Explaining and Managing Risk (A4)
1.5 Record Keeping, Interim Reporting and Final Results (A5)
1.6 Soft Skills and Assessment Management Quiz
2.1 IP Protocols (B1)
2.2 Network Architectures (B2)
2.3 Network Mapping and Target Identification (B4)
2.4 Filtering Avoidance Techniques (B6)
2.5 OS Fingerprinting (B8)
2.6 Application Fingerprinting and Evaluating Unknown Services (B9)
2.7 Cryptography (B11)
2.8 Applications of Cryptography (B12)
2.9 File System Permissions (B13)
2.10 Audit Techniques (B14)
2.11 Core Technical Skills Quiz
3.1 Registration Records (C1)
3.2 Domain Name Server (DNS) (C2)
3.3 Google Hacking and Web Enumeration (C4)
3.4 Information Leakage from Mail Headers (C6)
3.5 Background Information Gathering and Open Source Quiz
4.1 Management Protocols (D1)
4.2 Network Traffic Analysis (D2)
4.3 Networking Protocols (D3)
4.4 IPsec (D4)
4.5 VoIP (D5)
4.6 Wireless (D6)
4.7 Configuration Analysis (D7)
4.8 Networking Equipment Quiz
5.1 Domain Reconnaissance (E1)
5.2 User Enumeration (E2)
5.3 Active Directory (E3)
5.4 Windows Passwords (E4)
5.5 Windows Vulnerabilities (E5)
5.6 Windows Patch Management Strategies (E6)
5.7 Desktop Lockdown (E7)
5.8 Exchange (E8)
5.9 Common Windows Applications (E9)
5.10 Microsoft Windows Security Assessment Quiz
6.1 User Enumeration (F1)
6.2 UNIX/Linux Vulnerabilities (F2)
6.3 FTP (F3)
6.4 Sendmail/SMTP (F4)
6.5 Network File System (NFS) (F5)
6.6 R-Services (F6)
6.7 X11 (F7)
6.8 RPC Services (F8)
6.9 SSH (F9)
6.10 UNIX Security Assessment Quiz
7.1 Web Server Operation & Web Servers and Their Flaws (G1 & G2)
7.2 Web Enterprise Architectures (G3)
7.3 Web Protocols (G4)
7.4 Web Markup Languages (G5)
7.5 Web Programming Languages (G6)
7.6 Web Application Servers (G7)
7.7 Web APIs (G8)
7.8 Web Sub-Components (G9)
7.9 Web Technologies Quiz
8.1 Web Application Reconnaissance (H1)
8.2 Threat Modelling and Attack Vectors (H2)
8.3 Information Gathering from Web Mark-up (H3)
8.4 Authentication Mechanisms (H4)
8.5 Authorisation Mechanisms (H5)
8.6 Input Validation (H6)
8.7 Information Disclosure in Error Messages (H8)
8.8 Use of Cross Site Scripting (XSS) (H9)
8.9 Use of Injection Attacks (H10)
8.10 Session Handling (H11)
8.11 Encryption (H12)
8.12 Source Code Review (H13)
8.13 Web-Testing Methodologies Quiz
Web Site Structure Recovery (I1)
Cross Site Scripting Attacks (I2)
SQL Injection (I3)
Parameter Manipulation (I6)
9.1 Databases
9.2 Microsoft SQL Server (J1)
9.3 Oracle RDBMS (J2)
9.4 MySQL (J3)
9.5 Databases Quiz
Mock Exam 1
Mock Exam 2
TCP Ports
UDP Ports
Exam Information
CPSA Course Evaluation