Mile2

Certified Penetration Testing Engineer C)PTE Course

INE Instructor
INE Instructor

This course is included in our All Access Pass! Get unlimited streaming access to 12,000+ videos, workbooks, and practice exams by starting your free trial of the All Access Pass subscription!
Start Your FREE Trial!


Course Description
The vendor neutral Mile2 Certified Penetration Testing Engineer certification course is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by penetration testers. The C)PTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques.
  • Course
    • Introduction
      • CPTE Introduction
    • Business of Penetration Testing
      • Business & Technical Logistics of Pen Testing
      • Project Documentation
    • Operating System Basics
      • Linux Fundamentals
    • Discovering Systems
      • Information Gathering
      • Detecting Live Systems
      • Enumeration
      • Vulnerability Assessments
    • Hacking Operating systems
      • Malware Goes Undercover
      • Windows hacking
      • Hacking UNIX/Linux
      • Advanced Exploitation Techniques
    • Hacking Wireless
      • Pen Testing Wireless Networks
    • hacking Network
      • Networks, Sniffing, and IDS
    • Hacking Database
      • Injecting the Database
    • Hacking Web Servers
      • Attacking Web Technologies
Course Outline:
  • Course
    • Introduction
      • CPTE Introduction
    • Business of Penetration Testing
      • Business & Technical Logistics of Pen Testing
      • Project Documentation
    • Operating System Basics
      • Linux Fundamentals
    • Discovering Systems
      • Information Gathering
      • Detecting Live Systems
      • Enumeration
      • Vulnerability Assessments
    • Hacking Operating systems
      • Malware Goes Undercover
      • Windows hacking
      • Hacking UNIX/Linux
      • Advanced Exploitation Techniques
    • Hacking Wireless
      • Pen Testing Wireless Networks
    • hacking Network
      • Networks, Sniffing, and IDS
    • Hacking Database
      • Injecting the Database
    • Hacking Web Servers
      • Attacking Web Technologies

If you would like more information on how to purchase this course individually, contact a Training Specialist.