Certified Penetration Testing Engineer (CPTE)

You are here

Merit Network / Michigan Cyber Range
Monday, March 30, 2015 - 8:00am to Friday, April 3, 2015 - 4:00pm
Event Type: 
Ann Arbor Events
Business Training
United States
$2,250.00 (Member Rate) / $3,000.00 (Non-Member Rate)

Live Online!

Includes Certification Exam!

In this course, you will obtain real-world security knowledge that will enable you to recognize vulnerabilities, exploit system weaknesses and help safeguard against threats. You will learn the art of ethical hacking with a professional edge.

CPTE's foundation is built firmly upon proven penetration testing methodologies. The course presents information based on the five Key Elements of Pen Testing: Information Gathering, Scanning, Enumeration, Exploitation and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques.

Cyber Range training goes far beyond simply teaching you to "Hack". Be prepared to learn penetration testing using advanced persistent threat techniques along with the highest-level ethical hacking methodologies. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to business needs in order to reduce business risk.

The course was developed around principles and behaviors used by malicious hackers. The course is taught with this in mind while keeping the focus on professional penetration testing and ensuring the security of information assets.

Who should attend?

Network Administrators, Security professionals, Auditors, Site Administrators, Security Officers or anyone who is concerned about the integrity of their network including the design of a communications system, which includes the backbones, routers, switches, wireless access points, access methods and protocols used.

Objective of Labs

This is an intensive class that includes an updated 300-page lab guide. You may spend 20 hours or more performing labs that walk through a real-world pen testing model. Labs begin with simple activities and move on to more complex procedures. Labs will lead you through a detailed lab guide containing screen shots, commands to be typed, and steps should take. You will make use of scores of traditional and cutting-edge pen testing tools (GUI and command line, Windows and Linux) as you make your way through this time-tested methodology. Labs are continually updated as new methods arise in the security world.

Event Email: