Cyber Scheme Team Member
Exam Preparation


Cyberscheme Team Poster.png


17th January 2022

The Whitehouse Hotel, Foregate St, Worcester WR1 1EA, UK

NCSC (National Cyber Security Centre) mandates that all government penetration testing work must be conducted by organisations that have achieved CHECK status. NCSC deem the CSTM exam to be equivalent to the standard required for a CHECK Team Member (CTM).


Candidates entering the class will be introduced to the highly technical world of penetration testing. Whether you are manipulating network traffic to grab passwords with Ettercap, network mapping with Nmap or seeking out vulnerabilities with Metasploit – you will find yourself in a fascinating and engaging environment that will prepare you for the role of pen tester.

During the CSTM course, candidates are taught the theoretical & practical aspects of penetration testing in a real-life, hands-on scenario. You will take part in a mock penetration test against a fictitious client; however, the tools and techniques used will be real. From the moment candidates enter the class, they will be introduced to the highly technical world of penetration testing.

The weekends with a full practical day, allowing candidates to consolidate the skills gained.

Who is the CSTM for?

IT professionals in public or private enterprise are involved in or interested in vulnerability/penetration testing and IT security who wish to test their penetration testing skills to a standard accredited by NCSC/GCHQ.


Successful candidates will receive a ‘Certificate of Attainment’ issued by the Cyber Scheme valid for 3 years. The CSTM is a recognised equivalency to CHECK Team Member under the NCSC CHECK Scheme and is a requirement to obtain this status, but please note that CTM status may only be provided by NCSC, subject to status and employment, following successful completion of this examination.


  • Information security in the corporate world

  • Professionalism and communication skills

  • Ethics and the law

  • Core network protocols

  • Network enumeration and network mapping

  • Network device management and exploitation

  • Service enumeration

  • Service topology/dependency mapping

  • Application enumeration and profiling

  • Application and operating system management

  • Application and operating system exploitation

Skills Covered

All learning units are undertaken alongside practical exercises within the Merimetso labs.

  • Knowing the threat actors and their motives

  • Knowing your clients and why they engage your services

  • Supply chains, their impact and your responsibilities to them

  • Basic security monitoring

  • Pen test methodologies

  • Information gathering techniques – OSINT, passive network sniffing, DNS.

  • Computer Misuse Acts

  • GDPR and Data Protection

  • Using KALI

  • NMAP and port scanning tools

  • Metasploit

  • The OSI Model

  • TCP/IP and UDP protocols

  • ARP, FTP, IPsec, Wireless networking, DNS

  • Introduction to encryption

  • Active directory domains
    o RID and SID
    o LDAP

  • Operating systems and their architectures

  • System memory

  • Access control models and how they apply to operating systems

  • GRC security policies

  • OWASP Top Ten website penetration testing

  • Writing Reports

  • Understanding Risk Rating and Threats

  • Risk Scoring and Ranking

  • Pen Testing ‘Language’ and Terminology

  • Risk Management and Risk Analysis


Candidates undertaking CSTM will be expected to have at least the following:

  • Experience of Windows and Linux operating systems in a networked environment

  • CLI skills, including navigating file systems and manipulating files and directories for both Windows and Linux

  • Ability to interrogate network systems for basic information, such as IP address and MAC address

  • Knowledge of network fundamentals (IP addressing, subnets, routing)

  • Familiarity with TCP/IP stack and OSI model

  • Knowledge of common Internet protocols (HTTP, FTP, DNS etc.)