Penetration Testing Engineer (CPTE)
The Certified Penetration Testing Engineer course trains students on the 5 key elements of penetration testing: information gathering, scanning, enumeration, exploitation and reporting. Ethical hacking is the art of using these penetration testing techniques to identify and repair the latest vulnerabilities in a system to make sure it is secure. Malicious hackers use these same techniques to find the same vulnerabilities except they exploit the vulnerabilities giving them access to the businesses’ network. Once inside, hackers can access private information, such as usernames, passwords, credit card numbers, and social security numbers of clients and employees. It’s very likely this data will be held for ransom or sold off on a black market. Hackers are constantly looking for new companies they can exploit; when they come across yours, will they be able to gain access? Certified Penetration Testing Engineers are the solution to prevent this from happening to businesses they serve.
With our proprietary penetration testing lab exercizes, students will spend about 20 hours getting real-world penetration testing experience. They'll know what they are learning and they'll know how to use it after course. Our instructors will also provide real life examples of when to use the techniques that are being taught. There is no better way to learn the art of penetration testing.
This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk.
The C)PTE’s foundation is built firmly upon proven, hands-on, penetration testing methodologies utilized by our international group of vulnerability consultants. Mile2 trainers keep abreast of their field by practicing what they teach; we believe that an equal emphasis on theoretical and real world experience is essential for effective knowledge transfer to you, the student.
Upon Completion, students will:
Who Should Attend
Module 0: Course Overview
Module 1: Business and Technical Logistics of Pen Testing
Module 2: Linux Fundamentals
Module 3: Information Gathering
Module 4: Detecting Live Systems
Module 5: Enumeration
Module 6: Vulnerability Assessments
Module 7: Malware Goes Undercover
Module 8: Windows Hacking
Module 9: Hacking UNIX/Linux
Module 10: Advanced Exploitation Techniques
Module 11: Pen Testing Wireless Networks
Module 12: Networks, Sniffing and IDS
Module 13: Injecting the Database
Module 14: Attacking Web Technologies
Module 15: Project Documentation
Lab 1: Getting Set Up
Lab 2: Linux Fundamentals
Lab 3: Information Gathering
Lab 4: Detecting Live Systems
Lab 5: Reconnaissance
Lab 6: Vulnerability Assessment
Lab 7: Malware
Lab 8: Windows Hacking
Lab 9: Hacking UNIX/Linux
Lab 10: Advanced Vulnerability and Exploitation Techniques
Lab 11: Attacking Wireless Networks
Lab 12: Network Sniffing and IDS
Lab 13: Database Hacking
Lab 14: Hacking Web Applications
Lab 15: Cryptography
Post Class Lab: Core Impact
For more information on course modules, please refer to our brochure.
Productivity and Innovation Credit (PIC) scheme
*Enjoy up to 400% tax deduction or 60% cash payout under the Productivity and Innovation Credit (PIC) scheme for Staff Training.
Find out more here!
Terms and conditions apply. Please contact IRAS for assistance or clarification on PIC.
Download Course Brochure Download Registration Form Course Schedule
|Copyright © 2017 Progreso Training Pte Ltd. All Rights Reserved.|