• Classroom
  • Online, Instructor-Led
  • Online, Self-Paced
Course Description

The C)PTE course/certification has been validated by the NSA for: CNSSI-4013, National Information Assurance Training Standard for System Administrators. Certified Penetration Testing Engineer graduates obtain real world security knowledge that will enable them to recognize vulnerabilities, exploit system weaknesses, and help safeguard threats. Graduates will learn the art of Ethical Hacking with a professional edge -Penetration Testing.

This 5 day course retails for $3,000 and is delivered via: classroom, live on line or self-study. The self-study course retails for $1500.

Learning Objectives

Objective of Labs:

This is an intensive hands-on class that includes an updated 300 page lab guide. Students may spend 20 hours or more performing labs that walk them through a real world Pen Testing model. Labs begin with simple activities and move on to more complex procedures. During labs, students move through a detailed Lab Guide containing screen shots, commands to be typed, and steps students should take. Students will make use of scores of traditional and cutting edge Pen Testing tools (GUI and command line, Windows and Linux) as they make their way through mile2's time-tested methodology. (See Outline below for tool titles) Customers can be confident that as new methods arise in the security world, our labs are updated to reflect them.

Upon Completion:

Upon proper completion of the course, C)PTE students will be able to confidently sit for the C)PTE certification exam. Students will enjoy an in-depth course that is regularly updated to maintain and incorporate changes in the cybersecurity environment. This course offers up-to-date proprietary labs that have been researched and developed by leading cybersecurity professionals from around the world.

Certified Penetration Testing Engineer Module Topics:

Module 0: Course Overview

Module 1: Business and Technical Logistics of Pen Testing

Module 2: Linux Fundamentals

Module 3: Information Gathering

Module 4: Detecting Live Systems

Module 5: Enumeration

Module 6: Vulnerability Assessments

Module 7: Malware Goes Undercover

Module 8: Windows Hacking

Module 9: Hacking UNIX/Linux

Module 10: Advanced Exploitation Techniques

Module 11: Pen Testing Wireless Networks

Module 12: Networks, Sniffing and IDS

Module 13: Injecting the Database

Module 14: Attacking Web Technologies

Module 15: Project Documentation

Appendix 1: The Basics

Appendix 2: Financial Sector Regulations

Appendix 3: Access Controls

Appendix 4: Protocols

Appendix 5: Cryptography

Appendix 6: Economics and Law

Framework Connections