Transform your cybersecurity skills by becoming a Certified Penetration Testing Consultant, mastering advanced techniques and strategies to thwart hackers with this comprehensive, hands-on training designed for aspiring security experts.
Design and execute comprehensive penetration testing strategies.
Implement non-technical breach methods to assess system vulnerabilities.
Understand business risk implications of security vulnerabilities.
Optimize security controls to effectively mitigate threats.
A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system. You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system. Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants. In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. CPTE Exam Prep, Exam Voucher & Free Retake are included
No upcoming dates. Please check back later.
What is Penetration Testing?
Today’s Threats
Staying up to Date
Pen Testing Methodology
Pre-Engagement Activities
What are we looking for?
Keeping Track of what we find!
Where/How do we find this Information?
Are there tools to help?
Countermeasures
What are we looking for?
Reaching Out!
Port Scanning
Are there tools to help?
Countermeasure
Banner Grabbing
Enumeration
What is a Vulnerability Assessment?
Tools of the Trade
Testing Internal/External Systems
Dealing with the Results
Key Loggers
Password Attacks
Rootkits & Their Friends
Clearing Tracks
Buffer Overflow
Exploits
Exploit Framework
Evading Firewall
Evading Honeypots
Evading IDS
PowerShell – A Few Interesting Items
Finding Passwords with PowerShell
Sniffing Techniques
OWASP Top 10
SQL Injection
XSS
What devices are we talking about?
What is the risk?
Potential Avenues to Attack
Hardening Mobile/IoT Devices
Report Components
Report Results Matrix
Recommendations
Recording IPs and Logging into the VMs
Research
Command Line Tips & Tricks
Linux Networking for Beginners
Using FTP during a pentest
Setting up and using magictree
Google Queries
Searching Pastebin
Maltego
People Search Using the Spokeo Online Tool
Recon with Firefox
Documentation
Finding a target using Ping utility
Footprinting a Target Using nslookup Tool
Scanning a Target Using nmap Tools
Scanning a Target Using Zenmap Tools
Scanning a Target Using hping3 Utility
Make use of the telnet utility to perform banner grabbing
Documentation
OS Detection with Zenmap
Enumerating a local system with Hyena
Enumerating services with nmap
DNS Zone Transfer
LDAP Enumeration
Vulnerability Assessment with SAINT
Vulnerability Assessment with OpenVAS
Creating a Virus
System Monitoring and Surveillance
Hiding Files using NTFS Streams
Find Hidden ADS Files
Hiding Files with Stealth Tools
Extracting SAM Hashes for Password cracking
Creating Rainbow Tables
Password Cracking
Mimikatz
Taking Advantage of Misconfigured Services
Cracking a Linux Password
Setting up a Backdoor
Metasploitable Fundamentals
Metasploit port and vulnerability scanning
Client-side attack with Metasploit
Armitage
Sniffing Passwords with Wireshark
Performing MitM with Cain
Performing MitM with sslstrip
Attacking MySQL Database
Manual SQL Injection
Attacking with XSS
Attacking with CSRF
Your team deserves training as unique as they are.
Let us tailor the course to your needs at no extra cost.
Trusted by Engineers at:
and more...
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier