Skip Ribbon Commands
Skip to main content

CPTE - Certified Penetration Testing Engineer

Price:

Duration: 5 Days

Audience:

Level:

Technology:

Delivery Method:

Software Assurance Value:

Microsoft CPE:

Course Information

Course Description

​The Certified Penetration Testing Engineer course educates students on the 5 key elements of penetration testing: 

Information gathering

Scanning

Enumeration

Exploitation

Reporting. 

Ethical hacking is the art of using these penetration testing techniques to identify and repair the latest vulnerabilities in a system to make sure it is secure. Malicious hackers use these techniques to find the same vulnerabilities, except they exploit the vulnerabilities giving them access to the network. 

With our proprietary penetration testing lab exercises, students will spend approximately 50% (20 hours) obtaining real-world penetration testing experience.  Industry-respected instructors will lead students through real life examples of when to use the techniques that are being taught. There is no better way to learn the art of penetration testing.

This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce and mitigate risks.

The CPTE foundation is built firmly upon proven, hands-on, penetration testing methodologies utilized by an international group of vulnerability consultants. 


Course Objectives

​Upon CompletionStudents will:

Have knowledge to perform penetration test

Have knowledge to accurately report on their findings from examinations

Be ready to sit for the C)PTE Exam


Related / Follow-on Courses:

After you complete the C)PTE course and get certified, we recommend you to further develop your penetration testing skillset by becoming certified as a C)PTC: Certified Penetration Testing Consultant.  The C)PTC is the most advanced penetration testing course available, and the 6 hour exam will have you perform a penetration test that will truly challenge your knowledge and skills!

C)PTC: Penetration Testing Consultant

C)IHE: Incident Handling Engineer

Course Content

With 15 up-to-date Modules and 16 Labs, the C)PTE will not only teach you the know-how of penetration testing, but you'll have real-world experience to solidify what you have learned.


Course Audience

​Penetration Testing Consultant

Security Analyst/Consultant

Security Architect

Chief Information Security Officer

Security Auditor

IT Management


Course Outline

​Basic Computer Security

What are the Risks?

Known Risks

Did You Know?

What are the Risks?

Things you NEED to know!

The “Hacker”

What is Identity Theft?

Fighting Identity Theft

Practice

Demo

Don’t Panic!


User Awareness

Overview

User Attacks

User Awareness

Passwords

Generating Passwords

Keeping Track Of Passwords

eWallet

Encryption Tools

Other Password Options

Windows Administrator Account

Demo

Windows Processes

Task Manager

Processes Tab

Searching Processes

Web Research

Process Information

Bad Processes

Removing Suspect Processes

Start-Up Tuners

Downloads

The User

E-Mail Links

Demo


Implementing Countermeasures

Overview

Internet Protection Solutions 

Choosing a Package

Free Anti-Virus & Spyware

Free Anti-Malware & Anti Spyware

Updating

Scheduling a Scan?

Demo

Patch Management

Demo

Internet Anonymizers

How They Work

Demo


Essential Security Awareness

Why Are You Here?

The Employer’s Liability

Steps to an Effective Security Program

Starting at the Top

Why This All Matters

Areas of Concern

What’s In This For Me?

Course Format


Using the Internet at Work

Module Objectives

Why Can’t I Just Do What I Want?

Internet Acceptable Use Policy

The Internet at Work

Internet Basics

Internet Threats

Internet Access

Your Web Browser

ActiveX & Java

Media Files

E-Mail

Chat

Web Storage

Web Proxies

P2P

Spyware

Countermeasures

Demo


Accessing the Network Locally

Module Objectives

What’s a LAN?

Logging In

Installing Applications

OS Utilities

Network Drives

Sharing

Removable Storage

Email Attachments

Virus Scanner

Management Software

Monitoring

Demos


Accessing the Network Remotely

Module Objectives

Work from Home

Your Home PC

From Your House to Work

Wireless

Hot Spots

Web Access for Email

Profile Management

VPNs

Demo


Social Engineering

Introduction

What is Social Engineering?

Definition of Social Engineering

Goals of Social Engineering

Types of Social Engineering

Attacks by Phone

Dumpster Diving

On-Line Social Engineering

On-Line Social Engineering

Persuasion

Social Engineering Roles

Reverse Social Engineering

What We Cover

Examples of our labs


Understanding and Interacting with our Target

Outline

Introduction

How are People Motivated?

Avoiding Pain

Pursuing Pleasure

Baselining

How to Read a Person

Body Movements

What About Over the Phone?

Re-Framing

Putting on the Right “Spin”

Marketing

Alter Perceptions of Pain or Pleasure

Saving-Face

Verbal Judo

Putting It All Together

Practice

Summary


Researching Our Target

Outline

Introduction

Google Hacks

Google Hacks Continued

Other Research Techniques

Dumpster Diving

Email Addresses

Current SOPs

Vendor Agreements

Inter-Office Memos

Shoulder Surfing

Eavesdropping

E-mail

Telephone Calls

Cubicles/Office Areas

Restaurants and Bars

Job Descriptions

Conclusion


Methods of Deception

Outline

Introduction

Impersonation in Person

The Job Interview

The Inspector

Delivery Person

Vendors/Contractors

Impersonation on the Phone

Help Desk 

IT Staff

Asking for Help

Summary

NMAP TCP Connect Scan

TCP Connect Port Scan

Nmap (cont.)

Tool Practice : TCP half-open & Ping Scan

Half-open Scan

Firewalled Ports

NMAP Service Version Detection

Additional NMAP Scans

NMAP UDP Scans

UDP Port Scan

Null Sessions

Syntax for a Null Session

SMB Null Sessions & Hardcoded Named Pipes

Windows Networking Services Countermeasures

Review


Course Prerequisites

​A minimum of 12 months experience in networking technologies

Sound knowledge of TCP/IP

Knowledge of Microsoft packages

Network+, Microsoft, Security+

Basic Knowledge of Linux is essential

C)VA/C)PEH or equivalent knowledge


Course Schedule
This course is not scheduled yet.

Upcoming Training

APCERT - A+ Certification