Close

Certified Penetration Testing Engineer

Penetration Testing Engineer Badge
A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system.  You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system.    Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants. 

In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk.

Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing.

The C)PTE is a part of these Role-Based Career Paths

ROLE-BASED CERTIFICATIONS

Penetration Testing and Ethical Hacking

INTERMEDIATE - 200 LEVEL

C)PEH

Professional Ethical Hacker

SPECIALIZATION - 300 LEVEL

C)PTE

Penetration Testing Engineer

ADVANCED - 400 LEVEL

C)PTC

Penetration Testing Consultant

and/or

C)PSH

Penetration Testing Engineer

Application and Ethical Hacking

C)PEH

Professional Ethical Hacker

C)PTE

Penetration Testing Engineer

C)SWAE

Secure Web Application Engineer

C)PTE Key Course Information

Live Class Duration: 5 Days

Language: English

Class Formats:
*  Instructor-led

*  Self-Study

*  Live Virtual Training

Prerequisites:

* A minimum of 12 months’ experience in networking technologies
* Sound knowledge of TCP/IP
* Knowledge of Microsoft packages
* Network+, Microsoft, Security+
* Basic Knowledge of Linux is essential

Applicable Exams:

*  Mile2 C)PTE

CPEs:  40

C)PTE Modules

  • Course Introduction
  • Module 1  – Business & Technical Logistics of Pen Testing
  • Module 2 – Information Gathering Reconnaissance – Passive (External Only)
  • Module 3 –  Detecting Live Systems – Reconnaissance (Active)
  • Module 4 –  Banner Grabbing and Enumeration
  • Module 5 –  Automated Vulnerability Assessment
  • Module 6 – Hacking Operating Systems
  • Module 7 – Advanced Assessment and Exploitation Techniques
  • Module 8 – Evasion Techniques
  • Module 9 –  Hacking with PowerShell
  • Module 10 –  Networks and Sniffing
  • Module 11 –  Accessing and Hacking Web Techniques
  • Module 12 – Mobile and IoT Hacking
  • Module 13 –  Report Writing Basics
  • Appendix: Linux Fundamentals

Who Should Attend

* Pen Testers
* Ethical Hackers
* Network Auditors
* Cybersecurity Professionals
* Vulnerability Assessors
* Cybersecurity Managers
* IS Managers

Accreditations

Upon Completion

Upon completion, Certified Penetration Testing Engineer students will be able to test an information system for both physical and technical areas of weakness and offer recommendations for strengthening those areas.

Re-Certification Requirements

All  Mile2 certifications will be awarded a 3-year expiration date.

There are two requirements to maintain Mile2 certification: 

1)  Pass the most current version of the exam for your respective existing certification

2)  Earn 20 CEUs (Continuing Education Units) per year. You may submit your CEUs in your Mile2 inbox. These CEUs must fall under “Qualify Continuing Educational Activities).

Visit our certification renewal page for more information.

C)PTE Exam Information

The Certified Penetration Testing Engineer exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions.


Purchase Options:

Course FAQ's

NO.  You do not have to purchase a course to purchase a certification exam.  

All of our courses can be taken independently.  In order to help guide our students on their cybersecurity career journey we have developed the Mile2 Certification Roadmap.

This helpful resource maps specific courses to Role-based career tracks.

There are over 30 Mile2 courses and certifications.  The courses follow Role-Based Career paths in the areas of Foundations, Management, Prevention, Recovery, and Auditing.

Please see our Certification Roadmap for full details.

All of our courses are available as Ultimate Self-Study Combos.  The purchase of these courses gives you access to all training videos, materials, exam preps, exam simulators, 1 exam and 1 free 2nd chance exam.  The only exception is Red Vs Blue as this course requires multiple participants and is available as a Live Class only.

You cannot transfer, share or give your self- study material to another person. The following is noted when you access your course material through your account. "Important Notice: By accessing the mile2® online course material, practice tests, exams, and related files, the student agrees to the following. I understand that my license to use mile2 electronic course materials is exclusively for my individual professional development. I will not transfer nor will I allow others to use the course materials or the test questions. I will not use any part of this material for teaching others nor will I incorporate it, nor allow it to be incorporated, in any other training materials or publications, electronic or print, without prior specific written consent of mile2®."

error: Content is protected!