Time: 120 Minutes
Passing Score: 75%
Format: Pearson VUE with questions derived from a large pool of questions which are randomly selected.
Other Requirements: None
Editors’ Quick Thoughts
Updated November 29, 2011: Mile2 had 2 certs for network pen testing, CPTS & CPTE for ‘specialist’ and ‘expert.’ They’ve recently changed the names around a bit to ‘engineer’ and ‘consultant.’ Thus the new names are Certified Penetration Testing Engineer (CPTE) which was formerly known as CPTS. And the Certified Penetration Testing Consultant (CPTC) has now taken the place of CPTE. As we learn more we’ll be sure to keep you updated.
From the Horse’s Mouth (Mile2′s Web Site Content):
Certified Penetration Testing Engineer graduates will obtain real world security knowledge enabling them to recognize vulnerabilities, exploit system weaknesses, and safeguard organizations against threats. Graduates will learn the art of Ethical Hacking with a professional edge (Penetration Testing).
CPTEngineer’s foundation is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by our international group of vulnerability consultants. Mile2 trainers keep abreast of their field by practicing what they teach. They believe that, during training, an equal emphasis should be placed on both theoretical and real world experience if the student is going to succeed in mastering the necessary skills to become a CPTEngineer..The CPTEngineer presents information based on the 5 Key Elements of Pen Testing: Information Gathering, Scanning, Enumeration, Exploitation and Reporting. System vulnerabilities will be discovered using these tried and true steps alongside the use of the latest hacking techniques.
This course also enhances the business skills needed by today’s students. It will enable them to identify protection opportunities, justify testing activities, and optimize security controls needed by businesses attempting to reduce risks.
mile2 goes far beyond simply teaching students to “Hack”. Mere hacking was the norm for classes that were available before mile2’s introduced a new methodology in teaching this advanced skill.
Our course was developed around principles and behaviors used by malicious hackers. The course is taught with this in mind while keeping the focus on professional penetration testing and ensuring the security of information assets.
Objective of Labs:
This is an intensive hands-on class. Students may spend 20 hours or more performing labs that walk them through a real world Pen Testing model. Labs begin with simple activities and move on to more complex procedures. During labs, students move through a detailed Lab Guide containing screen shots, commands to be typed, and steps students should take. Students will make use of scores of traditional and cutting edge Pen Testing tools (GUI and command line, Windows and Linux) as they make their way through mile2’s time-tested methodology. (See Outline below for tool titles) Customers can be confident that as new methods arise in the security world, our labs are updated to reflect them.
Upon proper completion of the course, CPTEngineer students will be able to confidently sit for the CPTEngineer certification exam (recommended). Students will enjoy an in-depth course that is continuously updated to maintain and incorporate changes in the security environment. This course offers up-to-date proprietary labs that have been researched and developed by leading security professionals from around the world.
Certified Penetration Testing Engineer Module Topics:
Module 0: Course Overview
Module 1: Business and Technical Logistics of Pen Testing
Module 2: Financial Sector Regulations
Module 3: Information Gathering
Module 4: Detecting Live Systems
Module 5: Enumeration
Module 6: Vulnerability Assessments
Module 7: Malware, Trojans and BackDoors
Module 8: Windows Hacking
Module 9: Hacking UNIX/Linux
Module 10: Advanced Exploitation Techniques
Module 11: Pen Testing Wireless Networks
Module 12: Networks, Sniffing and IDS
Module 13: Injecting the Database
Module 14: Attacking Web Technologies
Module 15: Report Writing
Appendix 1: The Basics
Appendix 2: Linux Fundamentals
Appendix 3: Access Controls
Appendix 4: Protocols
Appendix 5: Cryptography
Appendix 6: Economics and Law
More from Mile2.
Category: Ethical Hacking