Home Mile2Certified Ethical Hacker Boot Camp

Certified Ethical Hacker Boot Camp

Price
$5,500.00
Duration
5 Days
Delivery Methods
Virtual Instructor Led Private Group
Delivery
Virtual
EST
Description
Content
Course Description

The mile2 Certified Penetration Testing Engineer certification course is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by our international group of Penetration Testing consultants.

The C)PTE presents information based on the 5 Key Elements of Pen TestingInformation Gathering, Scanning, Enumeration, Exploitation and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques.

The Certified Penetration Testing Consultant course is designed for IT Security Professionals and IT Network Administrators who are interested in taking an in-depth look into specific Penetration tests and techniques against operating systems.  This course will teach you the necessary skills to work as a penetration testing team, the exploitation process, how to create a buffer overflow against programs running on Window and Linux while subverting features such as DEP and ASLR.

This course will guide you through OWASP Top 10, teach you how to create shellcode to gain remote code execution, and understand and build different proof of concept code based on exploits pulled from exploit-db and testing using a debugger. 

The course starts by explaining how to build the right penetration testing team, covers scanning with NMAP, leading into the exploitation process, a little fuzzing with spike to help guide our proof of concept code, writing buffer overflows, understanding OWASP, Linux stack smashing, Windows exploit protection and getting around those protection methods, a section on report writing, and capping off the course with a scenario that will you’re your skills as a penetration testing team

Who Should Attend?
  • Pen Testers
  • Ethical Hackers
  • Network Auditors
  • Cyber Security Professionals
  • Vulnerability Assessors
  • Cyber Security Managers
  • IS Managers
Course Content
Module 1: Course Overview
Module 2: Business & Technical Logistics of Pen Testing
Module 3: Linux Fundamentals
Module 4: Information Gathering
Module 5: Detecting Live Systems
Module 6: Enumeration
Module 7: Vulnerability Assessments
Module 8: Malware Goes Undercover
Module 9: Windows Hacking
Module 10: Hacking UNIX/Linux
Module 11: Advanced Exploitation Techniques
Module 12: Pen Testing Wireless Networks
Module 13: Networks, Sniffing and IDS
Module 14: Injecting the Database
Module 15: Attacking Web Technologies
Module 16: Project Documentation
Module 17: Securing Windows w/ Powershell
Module 18: Pen Testing with Powershell
Do You Need Help? Please Fill Out The Form Below
First Name*
Last Name*
Business Email*
Phone Number*
What do you need assistance with?*
Best way to contact me*
How can we help you?*