The CPT certification and exam

An introduction to the Certified Penetration Tester (CPT) Certification

So you want to be among the next generation of information security professionals and make your contribution to ensure the Confidentiality, Integrity and Availability (CIA) of online systems? Are you interested in the safeguard of digital assets, in protecting corporate networks and apps and advising business managers on how to better secure their IT infrastructure and devices? Than you might want to consider “ethical hacking” as a career for carrying out penetration testing and security assessments.

These white-hat hacker professionals test companies’ security measures and procedures by employing many of the same tactics that malicious intruders use in attacking systems. By utilizing tools and methods such as penetration testing, they are able to give a true measure of the overall safety of the company’s IT environment.

With the system owner’s permission, they take full control of computers on the network to check for security holes that could be exploited. They then advise on safeguards that the organization should establish to protect devices and critical data before they become compromised and used illegally. Growing concern about security means that companies need certified penetration testers (CPTs) to help keep their information safe.

This is sometimes thought to be one of the most frustrating jobs in the information security field. Penetration testers need to have the right mix of hands-on, practical skills and formal knowledge to understand the unique requirements of each system analyzed. That said, you may very well have what it takes to become a CPT.

Getting started

There are many different places to start on a journey towards becoming an ethical hacker. To steer your career exactly where you would like it to go in the penetration testing specialty, a great start is preparing for and obtaining an industry-recognized credential. (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Daniel Brecht. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/P35r61Ixk9g/