Skip to content

CPTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation, and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated with working with the internet. Besides utilizing ethical hacking methodologies, the student should be prepared to learn penetration testing methodologies using advanced persistent threat techniques. In this course, you will go through a complete penetration test from A-Z! You?ll learn to create your own assessment report and apply your knowledge immediately in the workforce.

Select a date below

Categories:

Dates are listed in Pacific Time Zone

= Guaranteed to run date

Description

Print Friendly, PDF & Email

Overview:

CPTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation, and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated with working with the internet. Besides utilizing ethical hacking methodologies, the student should be prepared to learn penetration testing methodologies using advanced persistent threat techniques. In this course, you will go through a complete penetration test from A-Z! You’ll learn to create your own assessment report and apply your knowledge immediately in the workforce.

Prerequisite(s):

A minimum of 12 months? experience in networking technologies, sound knowledge of TCP/IP, knowledge of Microsoft packages, Network+, Microsoft, Security+, Basic Knowledge of Linux is essential

Audience:

Pen Testers, Ethical Hackers, Network Auditors, Cyber Security professionals, Vulnerability Assessors, Cyber Security Managers, IS Managers

Outline:

Lesson 1: Business & Technical Logistics of Pen Testing

Lesson 2: Linux Fundamentals

Lesson 3: Information Gathering

Lesson 4: Detecting Live Systems

Lesson 5: Enumeration

Lesson 6: Vulnerability Assessments

Lesson 7: Malware Goes Undercover

Lesson 8: Windows hacking

Lesson 9: Hacking UNIX/Linux

Lesson 10: Advanced Exploitation Techniques

Lesson 11: Pen Testing Wireless Networks

Lesson 12: Networks, Sniffing, and IDS

Lesson 13: Injecting the Database

Lesson 14: Attacking Web Technologies

Lesson 15: Project Documentation

Lesson 16: Securing Windows s/ Powershell

Lesson 17: Pen Testing w/Powershell

Additional information

Length

5 days

Guaranteed to run

No