DescripciĂłn del curso:
The C)PTE exam covers a broad base of Penetration Testing areas to ensure that applicants are able to effectively manage the Penetration Testing process.
The C)PTE exam covers a broad base of Penetration Testing areas to ensure that applicants are able to effectively manage the Penetration Testing process.
Formato | Ritmo propio |
---|---|
Tema | |
Proveedor | Milla2 |
Longitud |
Suggested Prior Knowledge:
* A minimum of 12 months’ experience in networking technologies
* Sound knowledge of TCP/IP
* Knowledge of Microsoft packages
* Network+, Microsoft, Security+
* Basic Knowledge of Linux is essential
Applicable Exams:
*Â Mile2 C)PTE
Module 1 – Business & Technical Logistics of Pen Testing
Module 2 – Information Gathering Reconnaissance – Passive (External Only)
Module 3 –  Detecting Live Systems – Reconnaissance (Active)
Module 4 –  Banner Grabbing and Enumeration
Module 5 –  Automated Vulnerability Assessment
Module 6 – Hacking Operating Systems
Module 7 – Advanced Assessment and Exploitation Techniques
Module 8 – Evasion Techniques
Module 9 –  Hacking with PowerShell
Module 10 –  Networks and Sniffing
Module 11 –  Accessing and Hacking Web Techniques
Module 12 – Mobile and IoT Hacking
Module 13 –  Report Writing Basics
Appendix:Â Linux Fundamentals
Lab 1 – Introduction to Pen Testing Setup
Lab 2 – Linux Fundamentals
Lab 3 – Using Tools for Reporting
Lab 4 –  Information Gathering
Lab 5 –  Detecting Live Systems
Lab 6 – Enumeration
Lab 7 – Vulnerability Assessments
Lab 8 – Software Goes Undercover
Lab 9 –  System Hacking- Windows
Lab 10 – System Hacking – Linux
Lab 11 –  Advanced Vulnerability and Exploitation Techniques
Lab 12 – Network Sniffing/IDS
Lab13 –  Attacking Databases
Lab 14 – Attacking Web Application
* Pen Testers
* Ethical Hackers
* Network Auditors
* Cybersecurity Professionals
* Vulnerability Assessors
* Cybersecurity Managers
* IS Managers
A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system. You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system.  Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants
In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk.
Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing.
The C)PTE exam covers a broad base of Penetration Testing areas to ensure that applicants are able to effectively manage the Penetration Testing process.
Technology:
*Â Computers and Electronics
*Â Engineering and Technology
*Â Programming
Communications:
*Â Oral Comprehension
*Â Oral Expression
*Â Reading Comprehension
*Â Written Comprehension
*Â Writing
*Â English Language
Observations:
*Â Problem Sensitivity
*Â Social Perceptiveness
*Â Visualization
Pensamiento crĂtico:
*Â Critical Thinking
*Â Deductive Reasoning
*Â Inductive Reasoning
*Â Judgement and Decision Making
*Â Complex Problem solving
*Â Coordination
*Â Information Ordering
*Â Systems Analysis
*Â Systems Evaluation
Workplace:
*Â Customer and Personal Service
*Â Personnel and Human Resources
*Â Active Learning
*Para más detalles llame al: 858-208-4141 o correo electrónico: formación@ccslearningacademy.com; ventas@ccslearningacademy.com
NOTA:Â Estos son nuestros cursos de aprendizaje electrĂłnico impartidos por socios.