CPTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation, and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated with working with the internet. Besides utilizing ethical hacking methodologies, the student should be prepared to learn penetration testing methodologies using advanced persistent threat techniques. In this course, you will go through a complete penetration test from A-Z! You?ll learn to create your own assessment report and apply your knowledge immediately in the workforce.
CPTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation, and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated with working with the internet. Besides utilizing ethical hacking methodologies, the student should be prepared to learn penetration testing methodologies using advanced persistent threat techniques. In this course, you will go through a complete penetration test from A-Z! You’ll learn to create your own assessment report and apply your knowledge immediately in the workforce.
Prerequisite(s):
A minimum of 12 months? experience in networking technologies, sound knowledge of TCP/IP, knowledge of Microsoft packages, Network+, Microsoft, Security+, Basic Knowledge of Linux is essential
CPTE – Certified Penetration Testing Engineer
Dates are listed in Pacific Time Zone
$3,000.00
CPTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation, and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated with working with the internet. Besides utilizing ethical hacking methodologies, the student should be prepared to learn penetration testing methodologies using advanced persistent threat techniques. In this course, you will go through a complete penetration test from A-Z! You?ll learn to create your own assessment report and apply your knowledge immediately in the workforce.
Description
Overview:
CPTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation, and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated with working with the internet. Besides utilizing ethical hacking methodologies, the student should be prepared to learn penetration testing methodologies using advanced persistent threat techniques. In this course, you will go through a complete penetration test from A-Z! You’ll learn to create your own assessment report and apply your knowledge immediately in the workforce.
Prerequisite(s):
A minimum of 12 months? experience in networking technologies, sound knowledge of TCP/IP, knowledge of Microsoft packages, Network+, Microsoft, Security+, Basic Knowledge of Linux is essential
Audience:
Pen Testers, Ethical Hackers, Network Auditors, Cyber Security professionals, Vulnerability Assessors, Cyber Security Managers, IS Managers
Outline:
Lesson 1: Business & Technical Logistics of Pen Testing
Lesson 2: Linux Fundamentals
Lesson 3: Information Gathering
Lesson 4: Detecting Live Systems
Lesson 5: Enumeration
Lesson 6: Vulnerability Assessments
Lesson 7: Malware Goes Undercover
Lesson 8: Windows hacking
Lesson 9: Hacking UNIX/Linux
Lesson 10: Advanced Exploitation Techniques
Lesson 11: Pen Testing Wireless Networks
Lesson 12: Networks, Sniffing, and IDS
Lesson 13: Injecting the Database
Lesson 14: Attacking Web Technologies
Lesson 15: Project Documentation
Lesson 16: Securing Windows s/ Powershell
Lesson 17: Pen Testing w/Powershell
Additional information
5 days
No