The C)PTE course/certification has been validated by the NSA for: CNSSI-4013, National Information Assurance Training Standard for System Administrators. Certified Penetration Testing Engineer graduates obtain real world security knowledge that will enable them to recognize vulnerabilities, exploit system weaknesses, and help safeguard threats. Graduates will learn the art of Ethical Hacking with a professional edge -Penetration Testing.
This 5 day course retails for $3,000 and is delivered via: classroom, live on line or self-study. The self-study course retails for $1500.
Learning Objectives
Objective of Labs:
This is an intensive hands-on class that includes an updated 300 page lab guide. Students may spend 20 hours or more performing labs that walk them through a real world Pen Testing model. Labs begin with simple activities and move on to more complex procedures. During labs, students move through a detailed Lab Guide containing screen shots, commands to be typed, and steps students should take. Students will make use of scores of traditional and cutting edge Pen Testing tools (GUI and command line, Windows and Linux) as they make their way through mile2's time-tested methodology. (See Outline below for tool titles) Customers can be confident that as new methods arise in the security world, our labs are updated to reflect them.
Upon Completion:
Upon proper completion of the course, C)PTE students will be able to confidently sit for the C)PTE certification exam. Students will enjoy an in-depth course that is regularly updated to maintain and incorporate changes in the cybersecurity environment. This course offers up-to-date proprietary labs that have been researched and developed by leading cybersecurity professionals from around the world.
Certified Penetration Testing Engineer Module Topics:
Module 0: Course Overview
Module 1: Business and Technical Logistics of Pen Testing
Module 2: Linux Fundamentals
Module 3: Information Gathering
Module 4: Detecting Live Systems
Module 5: Enumeration
Module 6: Vulnerability Assessments
Module 7: Malware Goes Undercover
Module 8: Windows Hacking
Module 9: Hacking UNIX/Linux
Module 10: Advanced Exploitation Techniques
Module 11: Pen Testing Wireless Networks
Module 12: Networks, Sniffing and IDS
Module 13: Injecting the Database
Module 14: Attacking Web Technologies
Module 15: Project Documentation
Appendix 1: The Basics
Appendix 2: Financial Sector Regulations
Appendix 3: Access Controls
Appendix 4: Protocols
Appendix 5: Cryptography
Appendix 6: Economics and Law
Framework Connections
Specialty Areas
- Cyber Defense Analysis
- Risk Management
- Systems Analysis
- Test and Evaluation
- Vulnerability Assessment and Management
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.