Course Length:  5-days

Course Description

The C)PTE course trains students on the 5-key elements of penetration testing:  information gathering, scanning, enumeration, exploitation, and reporting.  Ethical hacking is the art of using these penetration testing techniques to identify and repair the latest vulnerabilities giving them access to the businesses network. Once inside, hackers can access private information, such as usernames, passwords, credit card numbers, and social security numbers of clients and employees. Hackers are constantly looking for new companies they can exploit; when they come across yours, will they be able to gain access?  Certified Penetration Testing Engineers are the solution to prevent this from happening to businesses they serve.  This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk.

The C)PTE foundation is built firmly upon proven, hands-on, penetration testing methodologies utilized by our international group or vulnerability consultants.  The class puts an equal emphasis on both theoretical and real world experiences for effective knowledge transfer. Based on C)PTE teaching behaviors used to combat malicious hackers and focusing on penetration testing rather than “ethical hacking,” the course is often viewed as an up-grade and more current than EC-Council’s CEH!

C)PTE was developed for the United States Air Force, and is rated “Expert” Level by CompTIA.

It is accredited by NSA:  CNSSI-4013 National Information Assurance Training Standard for Systems Administrators


  • A minimum of 12 months experience in networking technologies
  • Sound knowledge of TCP/IP
  • Network+
  • Security+
  • Basic knowledge of Linux

Course Details

Module 1: Business and Technical Logistics of Penetration Testing

Module 2: Linux Fundamentals

Module 3: Information Gathering

Module 4: Detecting Live System

Module 5: Enumeration

Module 6: Vulnerability Assessments

Module 7: Malware Goes Undercover

Module 8: Windows Hacking

Module 9: Hacking UNIX/Linux

Module 10: Advanced Exploitation Techniques

Module 11: Pen Testing Wireless Networks

Module 12: Networks, Sniffing, IDS

Module 13: Injecting the Database

Module 14: Attacking Web Technologies

Module 15: Project Documentation


The Certified Penetration Testing Engineer exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your account.