Certified Penetration Testing Engineer Courses training Kuala Lumpur Malaysia

About this course

Duration: 5.00 days

The vendor-neutral Certified Penetration Testing Engineer certification course is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by our international group of Penetration Testing Consultants. 
Learning Center : Galactic Solutions
Email : sales@galacticsolutions.com.my

The C)PTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation, and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques.  

COURSE OUTLINE

Upon completing this course, the learner will be able to meet these overall objectives:
  • » Module 0 - Course Introduction.
  • » Module 1 - Business & Technical Logistics of Pen Testing
  • » Module 2 - Information Gathering Reconnaissance - Passive (External Only)
  • » Module 3 - Detecting Live Systems – Reconnaissance (Active)
  • » Module 4 - Banner Grabbing and Enumeration
  • » Module 5 - Automated Vulnerability Assessment
  • » Module 6 - Hacking Operating Systems
  • » Module 7 - Advanced Assessment and Exploitation Techniques
  • » Module 8 - Evasion Techniques
  • » Module 9 - Hacking with PowerShell
  • » Module 10 - Networks and Sniffing
  • » Module 11 - Accessing and Hacking Web Techniques
  • » Module 12 - Mobile and IoT Hacking
  • » Module 13 - Report Writing Basics
  • » Appendix: Linux Fundamentals
  • lABS

    1. Lab 1 - Introduction to Pen Testing Setup
    1. Lab2-Linux Fundamentals
    1. Lab 3 - Using Tools For Reporting
      1. Lab 4 - Information Gathering
      1. Lab 5 - Detecting Live Systems - Scanning Techniques
      1. Lab 6 - Enumeration
      1. Lab 7 - Vulnerability Assessments
      1. Lab 8 - Software Goes Undercover
      1. Lab 9 –Network Sniffing/IDS
      1. Lab 9 - System Hacking - Windows
      1. Lab 10 - System Hacking – Linux/Unix Hacking
      1. Lab 11 - Advanced Vulnerability and Exploitation Techniques
      1. Lab 12 - Network Sniffing/IDS
      1. Lab 13 - Attacking Databases
      1. Lab 14 - Attacking Web Applications
      REQUEST US FOR MORE DETAILS