top of page

Certified Penetration Testing Engineer

Duration

Instructor led or Self-Paced

About the Course

For Thoroughly understanding the process of penetration testing, a methodological approach is necessary. To meet this end goal the Certified Penetration Testing Engineer or C)PTE course is designed my Mile2 for teach the students the foundations of penetration testing process and its associated phases.


Penetration testing comprises of inter-linked phases - Information gathering, Scanning, Enumeration, Exploitation & Reporting.


The CPTE course teaches these important phases of penetration testing and additionally, teaches you about the business skills needed to identify security opportunities, justify the testing activity & utilise the security controls to their optimal level and reduce the business risks.


After the course completion, you will have sufficient knowledge and skills to move ahead in the career of cyber security.


We also provide Cloud Virtual Labs to students for easy connection to our range of virtual machines hosted on a dedicated environment for practising 24X7

Learning Mode

Online / Offline / Self Study

Who should attend?

  • Students

  • Ethical Hackers

  • Pentesters

  • Network Auditors

  • Cyber Security Professionals

  • Vulnerability Assessors

  • Cyber Security Managers

  • Information Security Managers

Modules / Lessons

Module - 1: Business & Technical Logistics of Pentesting

Module - 2: Information gathering Reconnaissance (External only)

Module - 3: Detecting Live systems

Module - 4: Banner Grabbing and enumeration

Module - 5: Automated Vulnerability assessment

Module - 6: Hacking an OS

Module - 7: Advanced Assessment and exploitation techniques

Module - 8: Evasion Techniques

Module - 9: Hacking with powershell

Module - 10: Networks and sniffing

Module - 11: Hacking Web tech

Module - 12: Mobile and IoT Hacking

Module - 13: Report writing basics


Hands-on Labs

Lab - 1: Introduction to pentesting setup

Lab - 2: Linux fundamentals

Lab - 3: Using tools for reporting

Lab - 4: Information Gathering

Lab - 5: Detecting live systems

Lab - 6: Enumeration

Lab - 7: Vulnerability assessments

Lab - 8: Software goes undercover

Lab - 9: System hacking (Windows)

Lab - 10: System Hacking (Linux)

Lab - 11: Advanced Vulnerability and exploitation techniques

Lab - 12: Network sniffing/IDS

Lab - 13: Attacking Databases

Lab - 14: Attacking web applications

bottom of page