Certified Penetration Testing Engineer; C)PTE:
This vendor-neutral, instructor-led boot camp starts with the Penetration Testing Engineer course that is built firmly upon proven, hands-on, penetration testing methodologies utilized by an international group of Penetration Testing Consultants. The C)PTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation, and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated to working with the internet. The student will be using the latest tools, such as Saint, Metasploit through Kali Linux and PowerShell.
Mile2 goes far beyond simply teaching learners to “Hack”. The C)PTE was developed around principles and behaviors used to combat malicious hackers and focuses on professional penetration testing rather than “ethical hacking”. Besides utilizing ethical hacking methodologies, the student should be prepared to learn penetration testing methodologies using advanced persistent threat techniques. In this course participants will go through a complete penetration test from A-Z! Students learn to create your own assessment report and apply your knowledge immediately in the workforce. With this in mind, the CPTE certification course is a complete upgrade to the EC-Council CEH! The C)PTE exam is taken any time/anywhere online through Mile2’s MACS system, making the exam experience easy and mobile.
Certified Penetration Testing Consultant; C)PTC:
This vendor-neutral course will teach participants the necessary skills to work as a penetration testing team, the exploitation process, how to create a buffer overflow against programs running on Window and Linux while subverting features such as DEP and ASLR. This course will guide students through OWASP Top 10, teach learners how to create shellcode to gain remote code execution, and understand and build different proof of concept code based on exploits pulled from exploit-db and testing using a debugger. The course starts by explaining how to build the right penetration testing team, covers scanning with NMAP, leading into the exploitation process, a little fuzzing with spike to help guide our proof of concept code, writing buffer overflows,
understanding OWASP, Linux stack smashing, Windows exploit protection and getting around those protection methods, a section on report writing, and capping off the course with a scenario that will enable skills to lead a penetration testing team.
This course uses in-depth lab exercises after most modules. Students may spend 16 hours+ performing labs that emulate a real-world Pen Testing and exploit development. Note: this boot camp is four (4) courses in one...and includes the following:
- Instructor-Led Session (C)PTE and C)PTC)
- Course Video (on-Demand; all 4 courses)
- Exam Preps
- e-Lab Guides
- Exam Simulators
- Cyber Range (1 week)
- Exam Vouchers (1 year expiration)
PLEASE NOTE: The C)SP and C)PEH course materials are provided for Self-Study only and will not be covered during the boot camp.
This course is designed for IT Security Professionals and IT Network Administrators who are interested in taking an in-depth look into specific Penetration tests and techniques against operating systems. This includes Pen Testers, Ethical Hackers, Network Auditors, Cyber Security Professionals and Vulnerability Assessors.
- Course Number C)PTE; C)PTC
- Course Length 5 days
- Course Fee $3,995.00
- Delivery Format vILT (Instructor Led; Virtual LIVE Online; Remote Training)
- Course Topic Certification
- Vendor Mile2
Register for course: C)PTE; C)PTC
"*" indicates required fields