Description
Mile2’s CPTE course goes far beyond simply teaching you to “hack”. The CPTE was developed around principles and behaviours used to combat malicious hackers and focuses on professional penetration testing rather than just “ethical hacking”.
Besides utilizing ethical hacking methodologies, you should be prepared to learn penetration testing methodologies using advanced persistent threat techniques. In this course, you will go through a complete penetration test from A-Z! You’ll learn to create your own assessment report and apply your knowledge immediately in the workforce.
KEY LEARNING POINTS
- This course takes what you have learned on your Certified Professional Ethical Hacker (CPEH) course and build on it to mould you into the ultimate Penetration Tester.
- You will learn how to assess vulnerabilities on your systems & networks, and then how to patch them
- This is designed for people who are already working in the cybersecurity environment, and is therefore not for beginners
ADVANTAGES OF THE COURSE
- This course will certify your Penetration Testing knowledge and ensure you are ready for a career in Cyber Security
- You will be given access to practice Labs for 4 weeks, after a certain point in your course, this allows you to put into practice what you have learned in the course
- Mile2 ensure that their courses make you career ready, rather than teaching you things you don’t need to know.
UNITS OF STUDY
- Course Introduction
- Business & Technical Logistics of Pen Testing
- Information Gathering Reconnaissance – Passive (External Only)
- Detecting Live Systems – Reconnaissance (Active)
- Banner Grabbing and Enumeration
- Automated Vulnerability Assessment
- Hacking Operating Systems
- Advanced Assessment and Exploitation Techniques
- Evasion Techniques
- Hacking with PowerShell
- Networks and Sniffing
- Accessing and Hacking Web Techniques
- Mobile and IoT Hacking
- Report Writing Basics
- Linux Fundamentals
- Introduction to Pen Testing Setup
- Linux Fundamentals
- Using Tools for Reporting
- Information Gathering
- Detecting Live Systems – Scanning Techniques
- Enumeration
- Vulnerability Assessments
- Software Goes Undercover
- System Hacking – Windows
- System Hacking – Linux/Unix Hacking
- Advanced Vulnerability and Exploitation Techniques
- Network Sniffing/IDS
- Attacking Databases
- Attacking Web Applications
Reviews
There are no reviews yet.