Certified Penetration Testing Engineer (CPTE) Training

7h 25m 54s
Last Updated: 2020-02-24
This Official Mile2® cyber security certification training series covers everything you need to know about becoming a Certified Penetration Testing Engineer. Participants will learn about logistics of pen testing, Linux fundamentals, information gathering, detecting live systems, enumeration, vulnerability assessments, undercover malware, Windows hacking, hacking UNIX/Linux, advanced exploitation techniques, pen testing wireless networks, networks, sniffing and IDS, injecting the database, attacking web technologies, and project documentation. This series, valued at $3,000, is available to Premium members, Team Accounts, and Qualified Experts.
This series prepares you to take the CPTE certification exam.

Becoming a Certified Penetration Testing Engineer lets you use the key elements of penetration testing to keep businesses safe through the practice of ethical hacking. Explore these penetration testing techniques to identify and repair the latest vulnerabilities in a system to make sure it is secure. This will protect businesses and individuals from malicious hackers. Once inside, hackers can access private information, such as usernames, passwords, credit card numbers, and social security numbers of clients and employees. Certified Penetration Testing Engineers are the solution to the problem of hackers exploiting the businesses they serve.

Having a Certified Penetration Testing Engineer on staff enhances the business. This role keeps partners, employees, and clients safe and helps identify protection needs while reducing any risks that could be there for hackers to take advantage of.

Being a Certified Penetration Testing Engineer, leads to professional roles not limited to ethical hacker, security consultants, system administrators, and chief security officers.

Certification Exam Process
 Upon completion of this series, the Mile2® CPTE certification series certification exam can be purchased here.
7h 25m 54s
Business and Technical Logistics of Penetration Testing
1 lessons25m 20sCompleted 0 / 1
Linux Fundamentals
1 lessons21m 48sCompleted 0 / 1
Information Gathering
1 lessons38m 31sCompleted 0 / 1
Detecting Live Systems
1 lessons33m 46sCompleted 0 / 1
1 lessons24m 58sCompleted 0 / 1
Vulnerability Assessments
1 lessons20m 00sCompleted 0 / 1
Malware Goes Undercover
1 lessons28m 15sCompleted 0 / 1
Windows Hacking
1 lessons38m 51sCompleted 0 / 1
Hacking UNIX/Linux
1 lessons36m 28sCompleted 0 / 1
Advanced Exploitation Techniques
1 lessons28m 31sCompleted 0 / 1
Pen Testing Wireless Networks
1 lessons34m 29sCompleted 0 / 1
Networks, Sniffing and Intrusion Detection System (IDS)
1 lessons42m 02sCompleted 0 / 1
Injecting the Database
1 lessons25m 43sCompleted 0 / 1
Attacking Web Technologies
1 lessons29m 52sCompleted 0 / 1
Project Documentation
1 lessons17m 20sCompleted 0 / 1
Tracy Preston
I’ve been in network and information assurance in both the corporate and government agencies since 1995. I have secret military clearance and have earned over 20 industry-recognized certifications that include CISSP, C)ISSO, C)PTE, C)DFE, ISO 27001, MCSE, CCNP, CEH, CHFI, Comptia A+, Network+, and Security+. I’m an expert in Cyber security and Cisco Networking, as well as the ISO 27001 & 8570 DOD standards. I’m a mile2® Master instructor and curriculum developer.
Tracy PrestonInstructor and Curriculum Developer
Other Courses by Tracy Preston