CPTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation, and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated with working with the internet. Besides utilizing ethical hacking methodologies, the student should be prepared to learn penetration testing methodologies using advanced persistent threat techniques. In this course, you will go through a complete penetration test from A-Z! You’ll learn to create your own assessment report and apply your knowledge immediately in the workforce.
A minimum of 12 months? experience in networking technologies, sound knowledge of TCP/IP, knowledge of Microsoft packages, Network+, Microsoft, Security+, Basic Knowledge of Linux is essential
Pen Testers, Ethical Hackers, Network Auditors, Cyber Security professionals, Vulnerability Assessors, Cyber Security Managers, IS Managers