About the Course
For Thoroughly understanding the process of penetration testing, a methodological approach is necessary. To meet this end goal the Certified Penetration Testing Engineer or C)PTE course is designed my Mile2 for teach the students the foundations of penetration testing process and its associated phases.
Penetration testing comprises of inter-linked phases - Information gathering, Scanning, Enumeration, Exploitation & Reporting.
The CPTE course teaches these important phases of penetration testing and additionally, teaches you about the business skills needed to identify security opportunities, justify the testing activity & utilise the security controls to their optimal level and reduce the business risks.
After the course completion, you will have sufficient knowledge and skills to move ahead in the career of cyber security.
We also provide Cloud Virtual Labs to students for easy connection to our range of virtual machines hosted on a dedicated environment for practising 24X7
Online / Offline / Self Study
Who should attend?
Cyber Security Professionals
Cyber Security Managers
Information Security Managers
Modules / Lessons
Module - 1: Business & Technical Logistics of Pentesting
Module - 2: Information gathering Reconnaissance (External only)
Module - 3: Detecting Live systems
Module - 4: Banner Grabbing and enumeration
Module - 5: Automated Vulnerability assessment
Module - 6: Hacking an OS
Module - 7: Advanced Assessment and exploitation techniques
Module - 8: Evasion Techniques
Module - 9: Hacking with powershell
Module - 10: Networks and sniffing
Module - 11: Hacking Web tech
Module - 12: Mobile and IoT Hacking
Module - 13: Report writing basics
Lab - 1: Introduction to pentesting setup
Lab - 2: Linux fundamentals
Lab - 3: Using tools for reporting
Lab - 4: Information Gathering
Lab - 5: Detecting live systems
Lab - 6: Enumeration
Lab - 7: Vulnerability assessments
Lab - 8: Software goes undercover
Lab - 9: System hacking (Windows)
Lab - 10: System Hacking (Linux)
Lab - 11: Advanced Vulnerability and exploitation techniques
Lab - 12: Network sniffing/IDS
Lab - 13: Attacking Databases
Lab - 14: Attacking web applications