Certificate In Certified Penetration Testing Engineer (CPTE) Online Course

Learn Penetration Testing Methodologies

Certificate In Certified Penetration Testing Engineer (CPTE) Online Course

NOW ONLY

US$99

Save US$500 (83%)
OFF RRP US$599
Get Info Pack

Learn Penetration Testing Methodologies

The Certified Penetration Testing Engineer (CPTE) is a vendor-neutral certification offered by Mile2 for aspiring penetration testing engineers who are looking to enhance their hands-on experience regarding the penetration testing methodologies used by the industry professionals. The course also covers the five key elements of penetration testing, namely; information gathering, scanning, enumeration, exploitation and reporting. These five key elements form a basis of discovering the vulnerabilities in a given system.

The Certified Penetration Testing Engineer (CPTE) course enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated with working with the internet. The course utilizes the latest tools, such as Saint, Metasploit through Kali Linux and Microsoft PowerShell.

Course Fast Facts:

  1. Learn the fundamentals of Certified Penetration Testing Engineer (CPTE)
  2. Comprehensive 15 module Accredited Certified Penetration Testing Engineer (CPTE) Online Course
  3. Study along with simple instructions & demonstrations
  4. Written and developed by leading Certified Penetration Testing Engineer (CPTE) experts
  5. Receive one-on-one online help & support
  6. Unlimited, lifetime access to online course
  7. Certificate of completion
  8. Study at your own pace with no rigid class timetables, 24/7 from any computer or smart device

Course Delivery

Courses are accessed online  by any device including PC, tablet or Smart Phone. Upon purchase an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. 

Recognition & Accreditation

All students who complete this course, receive a certificate of completion and will be issued a certificate via email.

Logistics of Pen Testing

  • Logistics of Pen Testing Part1
  • Logistics of Pen Testing Part2

Linux Fundamentals

  • Linux Fundamentals Part1
  • Linux Fundamentals Part2

Information Gathering

  • Information Gathering Part1
  • Information Gathering Part2

Detecting Live Systems

  • Detecting Live Systems Part1
  • Detecting Live Systems Part2

Enumeration

  • Enumeration Part1
  • Enumeration Part2

Vulnerability Assessments

  • Vulnerability Assessments

Malware Goes Undercover

  • Malware Goes Undercover Part1
  • Malware Goes Undercover Part2

Windows Hacking

  • Windows Hacking Part1
  • Windows Hacking Part2

Hacking UNIX/Linux

  • Hacking UNIX/Linux Part1
  • Hacking UNIX/Linux Part2

Advanced Exploitation Techniques

  • Advanced Exploitation Techniques Part1
  • Advanced Exploitation Techniques Part2

Pen Testing Wireless Networks

  • Pen Testing Wireless Networks Part1
  • Pen Testing Wireless Networks Part2

Networks, Sniffing and IDS

  • Networks, Sniffing and IDS Part1
  • Networks, Sniffing and IDS Part2
  • Networks, Sniffing and IDS Part3

Injecting the Database

  • Injecting the Database Part1
  • Injecting the Database Part2

Attacking Web Technologies

  • Attacking Web Technologies Part1
  • Attacking Web Technologies Part2

Project Documentation

  • Project Documentation

Entry requirements

Students must have basic literacy and numeracy skills.

Minimum education

Open entry. Previous schooling and academic achievements are not required for entry into this course.

Computer requirements

Students will need access to a computer and the internet. 

Minimum specifications for the computer are:

Windows:

  • Microsoft Windows XP, or later
  • Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS

  • OSX/iOS 6 or later
  • Modern and up to date Browser (Firefox, Chrome, Safari)

All systems

  • Internet bandwidth of 1Mb or faster
  • Flash player or a browser with HTML5 video capabilities(Currently Internet Explorer 9, Firefox, Chrome, Safari)

Students will also need access the following applications:

Adobe Acrobat Reader

About this Course

Learn Penetration Testing Methodologies

The Certified Penetration Testing Engineer (CPTE) is a vendor-neutral certification offered by Mile2 for aspiring penetration testing engineers who are looking to enhance their hands-on experience regarding the penetration testing methodologies used by the industry professionals. The course also covers the five key elements of penetration testing, namely; information gathering, scanning, enumeration, exploitation and reporting. These five key elements form a basis of discovering the vulnerabilities in a given system.

The Certified Penetration Testing Engineer (CPTE) course enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated with working with the internet. The course utilizes the latest tools, such as Saint, Metasploit through Kali Linux and Microsoft PowerShell.

Course Fast Facts:

  1. Learn the fundamentals of Certified Penetration Testing Engineer (CPTE)
  2. Comprehensive 15 module Accredited Certified Penetration Testing Engineer (CPTE) Online Course
  3. Study along with simple instructions & demonstrations
  4. Written and developed by leading Certified Penetration Testing Engineer (CPTE) experts
  5. Receive one-on-one online help & support
  6. Unlimited, lifetime access to online course
  7. Certificate of completion
  8. Study at your own pace with no rigid class timetables, 24/7 from any computer or smart device

Course Delivery

Courses are accessed online  by any device including PC, tablet or Smart Phone. Upon purchase an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. 

Recognition & Accreditation

All students who complete this course, receive a certificate of completion and will be issued a certificate via email.

Logistics of Pen Testing

  • Logistics of Pen Testing Part1
  • Logistics of Pen Testing Part2

Linux Fundamentals

  • Linux Fundamentals Part1
  • Linux Fundamentals Part2

Information Gathering

  • Information Gathering Part1
  • Information Gathering Part2

Detecting Live Systems

  • Detecting Live Systems Part1
  • Detecting Live Systems Part2

Enumeration

  • Enumeration Part1
  • Enumeration Part2

Vulnerability Assessments

  • Vulnerability Assessments

Malware Goes Undercover

  • Malware Goes Undercover Part1
  • Malware Goes Undercover Part2

Windows Hacking

  • Windows Hacking Part1
  • Windows Hacking Part2

Hacking UNIX/Linux

  • Hacking UNIX/Linux Part1
  • Hacking UNIX/Linux Part2

Advanced Exploitation Techniques

  • Advanced Exploitation Techniques Part1
  • Advanced Exploitation Techniques Part2

Pen Testing Wireless Networks

  • Pen Testing Wireless Networks Part1
  • Pen Testing Wireless Networks Part2

Networks, Sniffing and IDS

  • Networks, Sniffing and IDS Part1
  • Networks, Sniffing and IDS Part2
  • Networks, Sniffing and IDS Part3

Injecting the Database

  • Injecting the Database Part1
  • Injecting the Database Part2

Attacking Web Technologies

  • Attacking Web Technologies Part1
  • Attacking Web Technologies Part2

Project Documentation

  • Project Documentation

Entry requirements

Students must have basic literacy and numeracy skills.

Minimum education

Open entry. Previous schooling and academic achievements are not required for entry into this course.

Computer requirements

Students will need access to a computer and the internet. 

Minimum specifications for the computer are:

Windows:

  • Microsoft Windows XP, or later
  • Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS

  • OSX/iOS 6 or later
  • Modern and up to date Browser (Firefox, Chrome, Safari)

All systems

  • Internet bandwidth of 1Mb or faster
  • Flash player or a browser with HTML5 video capabilities(Currently Internet Explorer 9, Firefox, Chrome, Safari)

Students will also need access the following applications:

Adobe Acrobat Reader

We provide a 7 Day Money Back Refund on all Courses

Now Only US$99 Save US$500 (83%)
OFF RRP US$599
Delivery Method Online
Get Info Pack

Special Offer

 

Receive The Personal Success Training Program FREE, When You Purchase This Course - Limited Time Remaining!  (Value $600)

 

The Personal Success Training Program Helps You Stay Focused To Achieve Your Goals!
Benefits:
  • How to layout a Success Plan.
  • Get where you want to be in life.
  • How to unclutter your mind to succeed.
  • Achieve your dreams using your imagination.
  • How to have faith in yourself.
Features:
  • 12 month online access,  24/7 anywhere.
  • Complement your individual course purchase.
  • Internationally recognized by the IAOTS.
  • Thousands of positive reviews.
  • Limited Time Offer - Ends Soon.
 

Share this course

Course Summary

Course ID No.: 009SRCPTE
Delivery Mode: Online
Course Access: Unlimited lifetime
Tutor Support: Yes
Time required: Study at your own pace
Course Duration: 7.5 Hours
Assessments: Yes
Qualification: Certificate of Completion

Popular Courses and Bundles

Get a FREE Career Planner