Add to basket or enquire
This series covers everything you need to know about becoming a Certified Penetration Testing Engineer. Students will learn about logistics of pen testing, Linux fundamentals, information gathering, detecting live systems, enumeration, vulnerability assessments, malware going undercover, Windows hacking, hacking UNIX/Linux, advanced exploitation techniques, pen testing wireless networks, networks, sniffing and IDS, injecting the database, attacking web technologies, and project documentation.
Series Taught By: Tracy Preston
Becoming a Certified Penetration Testing Engineer lets you use the key elements of penetration testing to keep businesses safe. Ethical hacking is the art of using these penetration testing techniques to identify and repair the latest vulnerabilities in a system to make sure it is secure. This will protect businesses and individuals from malicious hackers. Once inside, hackers can access private information, such as usernames, passwords, credit card numbers, and social security numbers of clients and employees. Certified Penetration Testing Engineers are the solution to prevent hackers from exploiting the businesses they serve.
Having a Certified Penetration Testing Engineer enhances the business by keeping its partners, employees, and clients safe. It increases the ability to identify protection and reduce any risks that could be there for hackers to take advantage of.
Certification Exam Details:
Certified Penetration Testing Engineer: Learn More about this certification exam.
Does this training qualify for college credits?
Yes! This course series, as an elective title, does qualify for 1-3 college credits to be applied towards a degree program offered at American Business and Technology University.
Available CEUs for Course Series Completion: 10
Students can earn up to 10 CEUs for fully completing this course series. This information will be displayed on the certificate of completion.
Learn on-demand from top instructors who are industry subject matter experts. Our highly certified expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective, engaging, and professional manner to a wide audience.
Certificate of Completion
Upon completion of a series of courses you can earn a certificate of completion from Learning247. Certificates of Completion will display your full name, course completed, as well as the date of completion. Students have the ability to print this out or save it digitally to showcase your accomplishment.
Many of the in-depth theories and processes discussed in our courses can be learned most efficiently through the detailed PowerPoint slides presented. These visuals are accompanied by an instructor voice-over to provide our students with a clear, efficient, and complete presentation of concepts.
The immersive demonstrations in our training are a way for the instructor to present how to perform a task on-screen in front of the student. This feature gives the student the power to see tasks performed by a professional in the intended environment as many times as they would like, without purchasing expensive software.
Once a course is completed, test your knowledge by taking our course review quiz! Students have the ability to retake any review quizzes as many times as they wish to ensure they understand the material or to improve upon their scores.
Upon full completion of a training series, students can take a Series Final Exam, these exams are designed to test the students knowledge on all material trained within a series of courses. Students have the ability to retake any final exam as many times as they wish to ensure they understand the material or to improve upon their score.
With our universal course player, you can learn from your computer, tablet as well as mobile devices. Keep up with your training on the go!
Each course comes with a printable workbook that makes it easy to take notes as you learn. They also include a review quiz answer key, complete with answer explanations.
- Course 01 - Logistics of Pen Testing 25m
- Course 02 - Linux Fundamentals 22m
- Course 03 - Information Gathering 39m
- Course 04 - Detecting Live Systems 34m
- Course 05 - Enumeration 25m
- Course 06 - Vulnerability Assessments 20m
- Course 07 - Malware Goes Undercover 28m
- Course 08 - Windows Hacking 39m
- Course 09 - Hacking UNIX/Linux 36m
- Course 10 - Advanced Exploitation Techniques 29m
- Course 11 - Pen Testing Wireless Networks 34m
- Course 12 - Networks, Sniffing and IDS 42m
- Course 13 - Injecting the Database 26m
- Course 14 - Attacking Web Technologies 30m
- Course 15 - Project Documentation 17m
Career Path: Professional roles include, but are not limited to Ethical Hackers, Security Consultants, System Administrators, and Chief Security Officers.
Questions and answers
No questions or answers found containing ''.
what is the duration of the course
The online multimedia videos comprise about 8 hours of footage, but you will need to allow approx 75h in total to put in the work, practice and study required.This was helpful. Thank you for your feedback.
Rating and reviews
There haven't been any reviews for this course yet.Leave a review
This course is advertised on reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.