Course Length: 5-days
The C)PTE course trains students on the 5-key elements of penetration testing: information gathering, scanning, enumeration, exploitation, and reporting. Ethical hacking is the art of using these penetration testing techniques to identify and repair the latest vulnerabilities giving them access to the businesses network. Once inside, hackers can access private information, such as usernames, passwords, credit card numbers, and social security numbers of clients and employees. Hackers are constantly looking for new companies they can exploit; when they come across yours, will they be able to gain access? Certified Penetration Testing Engineers are the solution to prevent this from happening to businesses they serve. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk.
The C)PTE foundation is built firmly upon proven, hands-on, penetration testing methodologies utilized by our international group or vulnerability consultants. The class puts an equal emphasis on both theoretical and real world experiences for effective knowledge transfer. Based on C)PTE teaching behaviors used to combat malicious hackers and focusing on penetration testing rather than “ethical hacking,” the course is often viewed as an up-grade and more current than EC-Council’s CEH!
C)PTE was developed for the United States Air Force, and is rated “Expert” Level by CompTIA.
It is accredited by NSA: CNSSI-4013 National Information Assurance Training Standard for Systems Administrators
- A minimum of 12 months experience in networking technologies
- Sound knowledge of TCP/IP
- Basic knowledge of Linux
Module 1: Business and Technical Logistics of Penetration Testing
Module 2: Linux Fundamentals
Module 3: Information Gathering
Module 4: Detecting Live System
Module 5: Enumeration
Module 6: Vulnerability Assessments
Module 7: Malware Goes Undercover
Module 8: Windows Hacking
Module 9: Hacking UNIX/Linux
Module 10: Advanced Exploitation Techniques
Module 11: Pen Testing Wireless Networks
Module 12: Networks, Sniffing, IDS
Module 13: Injecting the Database
Module 14: Attacking Web Technologies
Module 15: Project Documentation