$950.00 On-Demand Learning

Overview

Course Includes:

  • Individual Course Access
  • Course Video
  • E-Workbook
  • E-Prep & Lab Guide
  • Exam
  • 2 Week Cyber Range
  • 1 Year Exam Voucher

Prerequisites:

  • A minimum of 12 months’ experience in networking technologies
  • Sound knowledge of TCP/IP
  • Knowledge of Microsoft packages
  • Network+, Microsoft, Security+
  • Basic Knowledge of Linux is essential

Student Materials:

  • Student Workbook
  • Student Prep Guide
  • CPEs: 40

 Who Should Attend?

  • Pen Testers
  • Ethical Hackers
  • Network Auditors
  • Cybersecurity professionals
  • Vulnerability Assessors
  • Cybersecurity Managers
  • IS Managers

The vendor-neutral Certified Penetration Testing Engineer certification course is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by our international group of Penetration Testing Consultants.

The C)PTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation, and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques.

This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated with working with the internet. The student will be using the latest tools, such as Saint, Metasploit through Kali Linux and Microsoft PowerShell. Mile2 goes far beyond simply teaching you to “Hack”. The C)PTE was developed around principles and behaviors used to combat malicious hackers and focuses on professional penetration testing rather than “ethical hacking”. Besides utilizing ethical hacking methodologies, the student should be prepared to learn penetration testing methodologies using advanced persistent threat techniques. In this course, you will go through a complete penetration test from A-Z! You’ll learn to create your own assessment report and apply your knowledge immediately in the workforce. With this in mind, the CPTE certification course is a complete upgrade to the EC-Council CEH! The C)PTE exam is taken anytime/anywhere online through mile2’s MACS system, making the exam experience easy and mobile. The student does not need to take the C)PTE course to attempt the C)PTE exam.

Upon completion, Certified Penetration Testing Engineer students will be able to establish industry acceptable auditing standards with current best practices and policies. Students will also be prepared to competently take the C)PTE exam.

Description

Course Outline

  • Module 0 – Course Overview
  • Module 1 – Business & Technical Logistics of Pen Testing
  • Module 2 – Linux Fundamentals
  • Module 3 – Information Gathering
  • Module 4 – Detecting Live Systems
  • Module 5 – Enumeration
  • Module 6 – Vulnerability Assessments
  • Module 7 – Malware Goes Undercover
  • Module 8 – Windows hacking
  • Module 9 – Hacking UNIX/Linux
  • Module 10 – Advanced Exploitation Techniques
  • Module 11 – Pen Testing Wireless Networks
  • Module 12 – Networks, Sniffing, and IDS
  • Module 13 – Injecting the Database
  • Module 14 – Attacking Web Technologies
  • Module 15 – Project Documentation
  • Module 16 – Securing Windows with Powershell
  • Module 17 – Pen Testing with Powershell

Lab Outline

  • Lab 1 – Introduction to Pen Testing Setup
  • Lab 2 – Linux Fundamentals
  • Lab 3 – Using Tools For Reporting
  • Lab 4 – Information Gathering
  • Lab 5 – Detecting Live Systems
  • Lab 6 – Enumeration
  • Lab 7 – Vulnerability Assessments
  • Lab 8 – Software Goes Undercover
  • Lab 9 – System Hacking – Windows
  • Lab 10 – System Hacking – Linux/Unix Hacking
  • Lab 11 – Advanced Vulnerability and
  • Lab 12 – Network Sniffing/IDS
  • Lab 13 – Attacking Databases
  • Lab 14 – Attacking Web Applications