The Certified Penetration Testing Engineer course trains students on the 5 key elements of penetration testing: information gathering, scanning, enumeration, exploitation and reporting. Ethical hacking is the art of using these penetration testing techniques to identify and repair the latest vulnerabilities in a system to make sure it is secure. Malicious hackers use these same techniques to find the same vulnerabilities except they exploit the vulnerabilities giving them access to the businesses’ network. Once inside, hackers can access private information, such as usernames, passwords, credit card numbers, and social security numbers of clients and employees. It’s very likely this data will be held for ransom or sold off on a black market. Hackers are constantly looking for new companies they can exploit; when they come across yours, will they be able to gain access? Certified Penetration Testing Engineers are the solution to prevent this from happening to businesses they serve.
With our proprietary penetration testing lab exercises, students will spend about 20 hours getting real-world penetration testing experience. They’ll know what they are learning and they’ll know how to use it after course. Our instructors will also provide real life examples of when to use the techniques that are being taught. There is no better way to learn the art of penetration testing.
This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk.
The C)PTE’s foundation is built firmly upon proven, hands-on, penetration testing methodologies utilized by our international group of vulnerability consultants. Mile2 trainers keep abreast of their field by practicing what they teach; we believe that an equal emphasis on theoretical and real world experience is essential for effective knowledge transfer to you, the student.
Also available as:
LIVE VIRTUAL TRAINING
Attend live classes from anywhere in the world!
Module 0: Course Overview
Module 1: Logistics of Pen Testing
Module 2: Linux Fundamentals
Module 3: Information Gathering
Module 4: Detecting Live Systems
Module 5: Enumeration
Module 6: Vulnerability Assessments
Module 7: Malware Goes Undercover
Module 8: Windows Hacking
Module 9: Hacking UNIX/Linux
Module 10: Advanced Exploitation Techniques
Module 11: Pen Testing Wireless Networks
Module 12: Networks, Sniffing and IDS
Module 13: Injecting the Database
Module 14: Attacking Web Technologies
Module 15: Project Documentation
Lab 1: Getting Set Up
Lab 2: Linux Fundamentals
Lab 3:Information Gathering
Lab 4: Detecting Live Systems
Lab 5: Reconnaissance
Lab 6: Vulnerability Assessment
Lab 7: Malware
Lab 8: Windows Hacking
Lab 9: UNIX/Linux Hacking
Lab 10: Advanced Vulnerability and Exploitation
Lab 11: Attacking Wireless Networks
Lab 12: Network Sniffing and IDS
Lab 13: Database Hacking
Lab 14: Hacking Web Applications
Lab A5: Cryptography
Post Class Lab: Core Impact
Our Courses Includes*:
Refer a friend Get 5% off*
Call Us Today!
(787) 998 0602
(787) 998 0720
Choose your best option:
• Classroom Training
• Online Training
• Live Virtual Training