Course Details
Overview
The vendor-neutral Certified Penetration Testing Engineer certification course is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by our international group of Penetration Testing Consultants.
The C)PTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation, and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques.
Outline
- Module 1 – Course Introduction
- Module 2 – Business & Technical Logistics of Pen Testing
- Module 3 – Information Gathering Reconnaissance – Passive (External Only)
- Module 4 – Detecting Live Systems – Reconnaissance (Active)
- Module 5 – Banner Grabbing and Enumeration
- Module 6 – Automated Vulnerability Assessment
- Module 7 – Hacking Operating Systems
- Module 8 – Advanced Assessment and Exploitation Techniques
- Module 9 – Evasion Techniques
- Module 10 – Hacking with PowerShell
- Module 11 – Networks and Sniffing
- Module 12 – Accessing and Hacking Web Techniques
- Module 13 – Mobile and IoT Hacking
- Module 14 – Report Writing Basics
- Appendix: Linux Fundamentals
Lab Outline
- Lab 1 – Introduction to Pen Testing Setup
- Lab 2 – Linux Fundamentals
- Lab 3 – Using Tools For Reporting
- Lab 4 – Information Gathering
- Lab 5 – Detecting Live Systems – Scanning Techniques
- Lab 6 – Enumeration
- Lab 7 – Vulnerability Assessments
- Lab 8 – Software Goes Undercover
- Lab 9 – System Hacking – Windows
- Lab 10 – System Hacking – Linux/Unix Hacking
- Lab 11 – Advanced Vulnerability and Exploitation Techniques
- Lab 12 – Network Sniffing/IDS
- Lab 13 – Attacking Databases
- Lab 14 – Attacking Web Applications
Pre-Requisites
- A minimum of 12 months’ experience in networking technologies
- Sound knowledge of TCP/IP
- Knowledge of Microsoft packages
- Network+, Microsoft, Security+
- Basic Knowledge of Linux is essential