A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system.  You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system.    Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants.  In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimi

starstarstarstarstar_outline

* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system. You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system.Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants.In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing.

1
  • Course Outline

  • Business & Technical Logistics of Pen Testing
    Information Gathering Reconnaissance – Passive (External Only)
    Detecting Live Systems – Reconnaissance (Active)
    Banner Grabbing and Enumeration
    Automated Vulnerability Assessment
    Hacking Operating Systems
    Advanced Assessment and Exploitation Techniques
    Evasion Techniques
    Hacking with PowerShell
    Networks and Sniffing
    Accessing and Hacking Web Techniques
    Mobile and IoT Hacking
    Report Writing Basics

Audience

Pen Testers Ethical Hackers Network Auditors Cybersecurity Professionals Vulnerability Assessors Cybersecurity Managers IS Managers

Language

English

Prerequisites

There are no stated prerequisites for this course. Please check with your representative for details.

$5,000

Length: 5.0 days (40 hours)

Level:

Not Your Location? Change

Course Schedule:

To request a custom delivery, please chat with an expert.

Loading...