Select Page

C-Practitioner Security Analyst (CPSA)

CPSA Course Overview

The C-Certified Penetration Tester (CCPT) program takes students of varying IT experience levels and re-skills them so that they can enter the industry not as a trainee but as qualified Penetration Tester making them productive from day one.

This in-depth, hands-on, 2-week course will take you into a rewarding and lucrative career in the Cyber Security world.


To help you forge a successful career within this sector we will thoroughly prepare you to gain two (2) of the most relevant, in-demand, industry recognized qualifications; which are:

+ CREST Practitioner Security Analyst (CPSA)
+ CREST Registered Penetration Tester (CRT)

Course Style:

The training combines Instructor led, Virtual Instructor led, and self-paced e-Learning modules. This “blended learning” approach integrates classroom, hands-on lab exercises and project teamwork to provide both the theoretical and practical training needed to make individuals Cyber Security professionals.

The course will allow our students to leave as sought-after professionals, well-equipped with the in-demand job skills and certifications needed to be employed as technically well rounded professionals in any Cyber Security team.

Don’t Wait any longer,enhance your career,


You will leave the Net Security Training CPSA Boot Camp with the knowledge and expertise to successfully pass the CPSA exam the first time you take it. Our Boot Camp currently has the highest pass rate in the industry, 94%!


View Dates,Location and Price Now


Book your course


Not sure which course is right for you?

Call us on
020 8840 4496 and we’ll help you try and find the best course for you.




Course Booking

April 24-27,2017




July 3-6,2017



Book Now


Nov 20-24,2017




                                   We Accept



Email us with the discount code wQ234yt for best price.

Math Captcha2 + 6 =

Course Syllabus

CREST Practitioner Security Analyst, CPSA & CREST Registered Tester, CRT

A1 Engagement Lifecycle
A2 Law & Compliance
A3 Scoping
A4 Understanding Explaining  and Managing Risk
A5 Record Keeping, Interim Reporting & Final Results
B1 IP Protocols
B2 Network Architectures
B3 Network Routing
B4 Network Mapping & Target Identification
B5 Interpreting Tool Output
B6 Filtering Avoidance Techniques
B7 Packet Crafting
B8 OS Fingerprinting
B9 Application Fingerprinting and Evaluating Unknown Services
B10 Network Access Control Analysis
B11 Cryptography
B12 Applications of Cryptography
B13 File System Permissions
B14 Audit Techniques
C1 Registration Records
C2 Domain Name Server (DNS)
C3 Customer Web Site Analysis
C4 Google Hacking and Web Enumeration
C5 NNTP Newsgroups and Mailing Lists
C6 Information Leakage from Mail & News Headers
D1 Management Protocols
D2 Network Traffic Analysis
D3 Networking Protocols
D4 IPSec
D6 Wireless
D7 Configuration Analysis
E1 Domain Reconnaissance
E2 User Enumeration
E3 Active Directory
E4 Windows Passwords
E5 Windows Vulnerabilities
E6 Windows Patch Management Strategies
E7 Desktop Lockdown
E8 Exchange
E9 Common Windows Applications

F1 User enumeration
F2 Unix vulnerabilities
F4 Sendmail / SMTP
F5 Network File System (NFS)
F6 R* services
F7 X11
F8 RPC services
G1 Web Server Operation
G2 Web Servers & their Flaws
G3 Web Enterprise Architectures
G4 Web Protocols
G5 Web Mark-up Languages
G6 Web Programming Languages
G7 Web Application Servers
G8 Web APIs
G9 Web SubComponents
H1 Web Application Reconnaissance
H2 Threat Modelling and Attack Vectors
H3 Information Gathering from Web Mark-up
H4 Authentication Mechanisms
H5 Authorisation Mechanisms
H6 Input Validation
H7 Application Fuzzing
H8 Information Disclosure in Error Messages
H9 Use of Cross Site Scripting Attacks
H10 Use of Injection Attacks
H11 Session Handling
H12 Encryption
H13 Source Code Review
I1 Web Site Structure Discovery
I2 Cross Site Scripting Attacks
I3 SQL Injection
I4 Session ID Attacks
I5 Fuzzing
I6 Parameter Manipulation
I7 Data Confidentiality & Integrity
I8 Directory Traversal
I9 File Uploads
I10 Code Injection

These course will interest you too!

CRT Boot Camp

CREST Registered Tester

CRIA Boot Camp

CREST Registered Intrusion Analyst

CRTSA Boot Camp

CREST Registered Technical Security Architect

Additional Information


Foundational knowledge required, preferably CISMP, CompTIA Security+ or equivalent.
eLearning of CISMP & the Security+ available to purchase.

Who should attend

This training is only intended for individuals preparing for the CPSA certification exam.