Canada's Leader in Professional Development

855-581-7246 Call us: 1-855-581-7246

Certified Penetration Testing Engineer

Currently no upcoming Class Dates

Description

The Certified Penetration Testing Engineer course trains students on the 5 key elements of penetration testing: information gathering, scanning, enumeration, exploitation and reporting. Ethical hacking is the art of using these penetration testing techniques to identify and repair the latest vulnerabilities in a system to make sure it is secure. Malicious hackers use these same techniques to find the same vulnerabilities except they exploit the vulnerabilities giving them access to the businesses' network. Once inside, hackers can access private information, such as usernames, passwords, credit card numbers, and social security numbers of clients and employees. It's very likely this data will be held for ransom or sold off on a black market. Hackers are constantly looking for new companies they can exploit; when they come across yours, will they be able to gain access? Certified Penetration Testing Engineers are the solution to prevent this from happening to businesses they serve. With our proprietary penetration testing lab exercizes, students will spend about 20 hours getting real-world penetration testing experience. They'll know what they are learning and they'll know how to use it after course. Our instructors will also provide real life examples of when to use the techniques that are being taught. There is no better way to learn the art of penetration testing. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. The C)PTE's foundation is built firmly upon proven, hands-on, penetration testing methodologies utilized by our international group of vulnerability consultants. Mile2 trainers keep abreast of their field by practicing what they teach; we believe that an equal emphasis on theoretical and real world experience is essential for effective knowledge transfer to you, the student.

Audience

This course is designed for Ethical Hackers, Security Consultants, System Administrators and Chief Security Officers.

Prerequisites

A minimum of 12 months experience in networking technologies Sound knowledge of TCP/IP Knowledge of Microsoft packages Network+, Microsoft, Security+ Basic Knowledge of Linux is essential C)VA/C)PEH or equivalent knowledge

Duration

5 Days/Lecture & Lab days

Topics

Course Introduction::Logistics of Penetration Testing::Linux Fundamentals::Information Gathering::Detecting Live System::Enumeration::Vulnerability Assessments::Malware Goes Undercover::Windows Hacking::Hacking UNIX/Linux::Advanced Exploitation Techniques::Pen Testing Wireless Networks::Networks, Sniffing, IDS::Injecting the Database::Attacking Web Technologies::Project Documentation::A1: Understanding Penetration Testing::A2: Financial Sector Regulations::A3: Access Controls::A4: Protocols::A5: Cryptography

Click here to reach us by Email Contact Us
About | Terms of Use | Privacy Visit our Facebook page   Visit ot Linkedin page   View our Tweets