Following the acquisition of Encription by BlackBerry UK Limited in February of 2016, the trading assets and liabilities of Encription Limited are being formally assigned to BlackBerry UK Limited effective from 31 January 2017.
For further information please call 0330 100 2345
Please note:- this is a multiple day course and you will need to book a hotel and bring lunch for the duration of the course. Hotel recommendations will be send as part of the joining instructions once the course is booked.
During the QSTM/CTM TigerScheme course candidates are taught the theoretical & practical aspects of penetration testing in a real-life, hands-on scenario.
You will take part in a mock penetration test against a fictitious client, however the tools and techniques used will be real. From the moment candidates enter the class they will be introduced to the highly technical world of penetration testing. Whether you are manipulating network traffic to grab passwords with Ettercap, network mapping with nmap or seeking out vulnerabilities with Metasploit – you will find yourself in a fascinating and engaging environment that will prepare you for the role of pen tester.
The week ends with a full day of practical, allowing candidates to consolidate the skills gained.
Our training network is state of the art and very challenging with up to date operating systems and vulnerabilities. (Not just windows 2000, 2003 and XP)
NCSC (National Cyber Security Centre) / CESG (Communications Electronics Security Group) mandates that all government penetration testing work must be conducted by organisations that have achieved CHECK status. CESG deem the CTM exam to be equivalent to the standard required for a CHECK Team Member (CTM).
Who is it for?
IT professionals in public or private enterprise who are involved in or interested in vulnerability/penetration testing and IT security who wish to test their penetration testing skills to a standard accredited by NCSC/CESG/GCHQ.
This course and exam is for the CHECK (CTM) qualification. (To be a full CHECK Team Member to work as a CTM you will need to pass the QSTM, have security clearance and work for a green light company.)
– multiple choice
– written paper
– practical assessment
Multiple choice Exam
Multiple choice examination of 80 questions for which one hour is allocated. This is a closed book assessment.
Written examination paper consisting of four questions of which candidates answer two. This is a closed book assessment.
Candidates will sit their practical assessments for which they have a total of 3 hours to complete the set tasks. Candidates will not be provided with a connection to the Internet and will not be permitted to make use of an Internet connection. Candidates must bring the following:
A system capable of conducting network and host discovery and demonstrating or identifying vulnerabilities
Candidates may use any software tools they deem appropriate, however, they must ensure they are appropriately licensed and function correctly
Failure to demonstrate penetration test capabilities due to hardware or software misconfiguration may result in failure.
Each candidate will be required to connect their testing system to an external monitor and mirror their screen so that they may be scrutinized during the assessment. If a candidate’s testing system is not capable of performing this action, they may fail the practical element of the test.
On completion of the practical stage, candidates are requested to provide a ‘synopsis’ of their findings to the examiner in a viva environment lasting no more than 30 minutes.
Once all four stages of the assessment are completed, the examiner will send the examination papers and notes on the practical test and viva for marking and final assessment.
Information security in the corporate world
Professionalism and communication skills
Ethics and the law
Core Network Protocols
Network enumeration and network mapping
Network device management and exploitation
Service topology/dependency mapping
Application enumeration and profiling
Application and operating system management
Application and operating system exploitation
APR Spoofing – Man In The Middle Attacks
Subnet Masks / CIDR / Routing
Port Scanning & Fingerprinting
Banner Grabbing/ Service Enumeration
XSS – Cross site Scripting / SQL Injection / Parameter Manipulation / OWASP top 10
Wireless Network Hacking
Firewall and AV Evasion
Candidates undertaking QSTM will be expected to have at least the following:
Experience of Windows and Linux operating systems in a networked environment
CLI skills, which include the navigation of file systems and manipulation of files and directories for both Windows and Linux
Ability to interrogate network systems for basic information such as IP address and MAC address
Knowledge of network fundamentals (IP addressing, subnets, routing)
Familiarity with TCP/IP stack and OSI Model
Knowledge of common Internet protocols (HTTP, FTP,DNS etc)
It is strongly advised you read the pre-course materials once you sign up.
This is a BlackBerry verified course.
If you need a retake or just don’t want / need the full training course (Practical day and Exam only) (CHECK NCSC rules state that a retake can not take place within 8 weeks of an unsuccessful attempt at the CHECK exam. Please consider this when choosing a retake date.)