Cyber Security Training Catalog – Certified Penetration Testing Engineer (CPTE) Series!

Overview:This Official Mile2® cyber security certification training series covers everything you need to know about becoming a Certified Penetration Testing Engineer. Students will learn about logistics of pen testing, Linux fundamentals, information gathering, detecting live systems, enumeration, vulnerability assessments, malware going undercover, Windows hacking, hacking UNIX/Linux, advanced exploitation techniques, pen testing wireless networks, networks, sniffing and IDS, injecting the database, attacking web technologies, and project documentation. Becoming a Certified Penetration Testing Engineer lets you use the key elements of penetration testing to keep businesses safe. Ethical hacking is the art of using these penetration testing techniques to identify and repair the latest vulnerabilities in a system to make sure it is secure. This will protect businesses and individuals from malicious hackers. Once inside, hackers can access private information, such as usernames, passwords, credit card numbers, and social security numbers of clients and employees. Certified Penetration Testing Engineers are the solution to prevent hackers from exploiting the businesses they serve. Having a Certified Penetration Testing Engineer enhances the business by keeping its partners, employees, and clients safe. It increases the ability to identify protection and reduce any risks that could be there for hackers to take advantage of.

Course Modules

(Duration: 25m)

  1. Workbook (Pdf)
  2. Logistics of Pen Testing
  3. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 22 m)

  1. Workbook (Pdf)
  2. Linux Fundamentals
  3. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 36 m)

  1. Workbook (Pdf)
  2. Information Gathering
  3. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 34m)

  1. Workbook (Pdf)
  2. Detecting Live Systems
  3. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 25m)

  1. Workbook (Pdf)
  2. Enumeration
  3. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 20 m)

  1. Workbook (Pdf)
  2. Vulnerability Assessments
  3. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 28m)

  1. Workbook (Pdf)
  2. Malware Goes Undercover
  3. Output Analysis and Reports
  4. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 39m)

  1. Workbook (Pdf)
  2. Windows Hacking
  3. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 36m)

  1. Workbook (Pdf)
  2. Hacking UNIX/Linux
  3. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 29 m)

  1. Workbook (Pdf)
  2. Advanced Exploitation Techniques
  3. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 34m)

  1. Workbook (Pdf)
  2. Pen Testing Wireless Networks
  3. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 42 m)

  1. Workbook (Pdf)
  2. Networks, Sniffing and IDS
  3. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 26m)

  1. Workbook (Pdf)
  2. Injecting the Database
  3. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 30 m)

  1. Workbook (Pdf)
  2. Attacking Web Technologies
  3. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 17m)

  1. Workbook (Pdf)
  2. Project Documentation
  3. Review Quiz (Number of attempts allowed: Unlimited)

Training Final Exam ?

Are you ready to earn your certificate of completion?

Launch The Exam

This course includes
  • about 7.26 hours on-demand video
  • 15 downloadable Pdf Workbooks
  • Unlimited time access (During Membership)
  • Access on mobile and Desktop
  • Certificate of Completion

Course Features Include:

  • Expert Lectures
    Learn on-demand from top instructors who are industry subject matter experts. Our highly certified expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective, engaging, and professional manner to a wide audience.

  • Certificates of Completion
    Upon completion of a series of courses you can earn a certificate of completion from Career Academy. Certificates of Completion will display your full name, course completed, as well as the date of completion. Students have the ability to print this out or save it digitally to showcase your accomplishment.

  • PowerPoint Visuals:
    Many of the in-depth theories and processes discussed in our courses can be learned most efficiently through the detailed PowerPoint slides presented. These visuals are accompanied by an instructor voice-over to provide our students with a clear, efficient, and complete presentation of concepts.

  • Professional Development Activities
    Students are provided access to professional development activity files which allow for an individual to test out course theories and apply the knowledge they earned from the course.

  • Review Quizzes
    Once a course is completed, test your knowledge by taking our course review quiz! Students have the ability to retake any review quizzes as many times as they wish to ensure they understand the material or to improve upon their scores.

  • Mobile Access
    With our universal course player, you can learn from your computer, tablet as well as mobile devices. Keep up with your training on the go!

Trusted by Aspiring IT Professionals, Corporations and
Government agencies
for more than a Decade

Get unlimited online access learn anywhere, anytime using your computer or mobile device!