A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system. You have to what you learned as a Ethical hacker because pen testing explores technical and non-technical ways of breaching security to gain acces to a system. Our C)PTE course is build on proven hands-on methods utilized by our international group of vulnerability consultants.
In this course you will learn 5 Key Elements of Pen Testing: Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus discover the latest vulnerabilities and techniques malicious hackers are using to acquire and destroy data. Additionally you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk.
Once you have completed this course, you will have learned everything you need to know about moving forward in a career in penetration testing.
Key Course information:
Duration: 5 days
Language: English
Class formats:
- Instructor-led
- Self-Study
- Live Virtual Training
Suggested Prior Knowledge:
- A minimum of 12 Months’ experience in networking technologies
- Sound Knowledge of TCP/IP
- Knowledge of Microsoft Packages
- Network+, Microsoft, Security+
- Basic knowledge of Linux is essential
Applicable Exams:
Mile2 C)PTE
CPEs: 40
Modules:
-
- Course Introduction
- Module 1: Business & Technical Logistics of Pen Testing
- Module 2: Information Gathering Reconnaissance – Passive (External Only)
- Module 3: Detecting Live Systems Reconnaissance – Active
- Module 4: Banner Grabbing and Enumeration
- Module 5: Automated Vulnerability Assessment
- Module 6: Hacking Operating Systems
- Module 7: Advanced Assessment and Exploitation Techniques
- Module 8: Evasion Techniques
- Module 9: Hacking with Power-Shell
- Module 10: Networks and Sniffing
- Module 11: Accessing and Hacking Web Techniques
- Module 12: Mobile and Io T Hacking
- Module 13: Report Writing Basics
- Appendix: Linux Fundamentals
Who should attend:
- Pen Testers
- Ethical Hackers
- Network Auditors
- Cybersecurity Professionals
- Vulnerability Assessors
- Cybersecurity Managers
- IS Managers
Upon Completion:
Upon completion, Certified Penetration Testing Engineer students will be able to test an information system for both physical and technical areas of weakness and offer recommendations for strengthening those areas.
Re-Certification Requirements:
All Mile2 certifications will be awarded a 3-year expiration date.
There are two requirements to maintain Mile2 Certification:
1) Pass the most current version of the exam for your respective existing certification
2) Earn 20 CEUs (Continuing Education Units) per year. You may submit your CEUs in your Mile2 inbox. These CEUs must fall under “Qualify Continuing Educational Activities).
C)PEH Exam Information:
The Certified Penetration Testing Engineer exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account.
The exam will take 2 hours and consists of 100 multiple choice questions.
Course Facts:
Do you have to purchase a course to buy a certification exam?
- No. You do not have to purchase a course to buy a certification exam.
Do all Mile2 courses map to a role based career path?
- All of our courses can be taken independently. In order to help guide our students on their cybersecurity career journey we have developed the Mile2 Certification Roadmap. This helpful resource maps specific courses to Role-based career tracks.