Mile2

Certified Penetration Testing Engineer C)PTE Course

INE Instructor
INE Instructor

This course is included in our All Access Pass! Get unlimited streaming access to 12,000+ videos, workbooks, and practice exams by starting your free 7-day trial of the All Access Pass subscription!
Start Your FREE Trial!


Course Description
The vendor neutral Mile2 Certified Penetration Testing Engineer certification course is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by penetration testers. The C)PTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques.
  • Course
    • Introduction
      • CPTE Introduction
    • Business of Penetration Testing
      • Business & Technical Logistics of Pen Testing
      • Project Documentation
    • Operating System Basics
      • Linux Fundamentals
    • Discovering Systems
      • Information Gathering
      • Detecting Live Systems
      • Enumeration
      • Vulnerability Assessments
    • Hacking Operating systems
      • Malware Goes Undercover
      • Windows hacking
      • Hacking UNIX/Linux
      • Advanced Exploitation Techniques
    • Hacking Wireless
      • Pen Testing Wireless Networks
    • hacking Network
      • Networks, Sniffing, and IDS
    • Hacking Database
      • Injecting the Database
    • Hacking Web Servers
      • Attacking Web Technologies
Course Outline:
  • Course
    • Introduction
      • CPTE Introduction
    • Business of Penetration Testing
      • Business & Technical Logistics of Pen Testing
      • Project Documentation
    • Operating System Basics
      • Linux Fundamentals
    • Discovering Systems
      • Information Gathering
      • Detecting Live Systems
      • Enumeration
      • Vulnerability Assessments
    • Hacking Operating systems
      • Malware Goes Undercover
      • Windows hacking
      • Hacking UNIX/Linux
      • Advanced Exploitation Techniques
    • Hacking Wireless
      • Pen Testing Wireless Networks
    • hacking Network
      • Networks, Sniffing, and IDS
    • Hacking Database
      • Injecting the Database
    • Hacking Web Servers
      • Attacking Web Technologies

If you would like more information on how to purchase this course individually, contact a Training Specialist.