COURSE OVERVIEW
A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system. You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system. Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants.
In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk.
Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing.
All Combos Include
Online Video
Electronic Book
Exam Prep Questions
Cyber Range Lab
KEY DATA INFORMATION
Live Class Duration
5 Days
Language
English
CEUs:
- 40
Applicable Exams:
Mile2 C)PTE
Suggested Prior Knowledge:
- A minimum of 12 months’ experience in networking technologies
- Sound knowledge of TCP/IP
- Knowledge of Microsoft packages
- Network+, Microsoft, Security+
- Basic Knowledge of Linux is essential
Class Formats
- Instructor-led
- Self-Study
- Live Virtual Training
C)PTE LIVE CLASS AND ULTIMATE SELF-STUDY COMBO MODULES
Module 1 -Business & Technical Logistics of Pen Testing
Module 2 - Information Gathering Reconnaissance – Passive (External Only)
Module 3 - Detecting Live Systems – Reconnaissance (Active)
Module 4 - Banner Grabbing and Enumeration
Module 5 - Automated Vulnerability Assessment
Module 6 - Hacking Operating Systems
Module 7 - Advanced Assessment and Exploitation Techniques
Module 8 - Evasion Techniques
Module 9 - Hacking with PowerShell
Module 10 - Networks and Sniffing
Module 11 - Accessing and Hacking Web Techniques
Module 12 - Mobile and IoT Hacking
Module 13 - Report Writing Basics
Appendix - Linux Fundamentals
C)PTE Course Accreditations
Who Should Take This Course
Pen Testers
Ethical Hackers
Network Auditors
IS Managers
Cybersecurity Professionals
Vulnerability Assessors
Cybersecurity Managers
OUR CLIENTS FEEDBACK
“I am greatly thankful for the cooperation and help from VIIT (Mile2 authorized training center) the successful completion of Certified Penetration Testing Engineer. I would like to thank each and every one for the support and guidance which helped me in completing my direction. Under these responsible personalities I was able to complete my course “CPTE” on time with success. I am working with E-Infosys Pvt. Ltd, Ahmedabad.”
“I am greatly thankful for the cooperation and help from VIIT (Mile2 authorized training center) the successful completion of Certified Penetration Testing Engineer. I would like to thank each and every one for the support and guidance which helped me in completing my direction. Under these responsible personalities I was able to complete my course “CPTE” on time with success. I am working with HDFC Securities Ltd.”