Mile2

Certified Penetration Testing Engineer C)PTE Course

INE Instructor
INE Instructor

Gain access to this course with an INE subscription!
Choose your plan!


Course Description
The vendor neutral Mile2 Certified Penetration Testing Engineer certification course is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by penetration testers. The C)PTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques.
  • Course
    • Introduction
      • CPTE Introduction
    • Business of Penetration Testing
      • Business & Technical Logistics of Pen Testing
      • Project Documentation
    • Operating System Basics
      • Linux Fundamentals
    • Discovering Systems
      • Information Gathering
      • Detecting Live Systems
      • Enumeration
      • Vulnerability Assessments
    • Hacking Operating systems
      • Malware Goes Undercover
      • Windows hacking
      • Hacking UNIX/Linux
      • Advanced Exploitation Techniques
    • Hacking Wireless
      • Pen Testing Wireless Networks
    • hacking Network
      • Networks, Sniffing, and IDS
    • Hacking Database
      • Injecting the Database
    • Hacking Web Servers
      • Attacking Web Technologies
Course Outline:
  • Course
    • Introduction
      • CPTE Introduction
    • Business of Penetration Testing
      • Business & Technical Logistics of Pen Testing
      • Project Documentation
    • Operating System Basics
      • Linux Fundamentals
    • Discovering Systems
      • Information Gathering
      • Detecting Live Systems
      • Enumeration
      • Vulnerability Assessments
    • Hacking Operating systems
      • Malware Goes Undercover
      • Windows hacking
      • Hacking UNIX/Linux
      • Advanced Exploitation Techniques
    • Hacking Wireless
      • Pen Testing Wireless Networks
    • hacking Network
      • Networks, Sniffing, and IDS
    • Hacking Database
      • Injecting the Database
    • Hacking Web Servers
      • Attacking Web Technologies