Skip to content

Certified Penetration Testing Engineer (C)PTE)


Hudson

Summary

Price
Enquire to get more info on pricing
Finance options

Spread your payments over a maximum of 12 months.

Study method
Online
Duration
40 hours · Self-paced
Certification
Certified Penetration Testing Engineer (C)PTE)
Professional certification What's this?
Additional info
  • Exam(s) / assessment(s) is included in price
  • Tutor is available to students

Overview

Hudson have partnered with Mile2 as an Authorized Training Center to offer the Certified Penetration Testing Engineer (CPTE) course. Mile2 designs, develops, and delivers Information Security training and Information Assurance services that meet military, government, private sector and institutional specifications. In doing so, Mile2 has become the de facto standard for a number organizations and militaries worldwide.

Key facts about Mile2

  • Mile2 has a strong military connection. Their Certified Penetration Testing Engineer (CPTE) certification played a pivotal role in assisting the United States Air Force (USAF) improve their security protocols. This course was originally designed for the USAF.
  • Mile2's certification courses are accredited by the National Security Agency (NSA) and Committee on National Security Systems (CNSS). They are also on the FBI's Preferred Tier 1-3 certification training list for prospective FBI agents specialising in cyber crime.
  • CompTIA recognises and acknowledges Mile2 courses as Expert Level, e.g. Mile2 CPTE.
  • Mile2 have their own IT Security Penetration Testing magazine called PenTest Magazine, which is published several times a year.
  • All Mile2 courses count as Continuing Education Units (CEUs) toward (ISC)2, ISACA, and SANS ongoing certification requirements.

About this course

The vendor neutral Certified Penetration Testing Engineer certification course is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by our international group of Penetration Testing consultants.

The CPTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques.

This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated to working with the internet. The student will be using the latest tools, such as Saint, Metasploit through Kali Linux and Microsoft PowerShell.

Mile2 goes far beyond simply teaching you to “Hack”. The C)PTE was developed around principles and behaviors used to combatmalicious hackers and focuses on professional penetration testing rather than “ethical hacking”.

Besides utilizing ethical hacking methodologies, the student should be prepared to learn penetration testing methodologies using advanced persistent threat techniques. In this course, you will go through a complete penetration test from A-Z! You’ll learn to
create your own assessment report and apply your knowledge immediately in the work force.

Upon completion, Certified Penetration Testing Engineer students will be able to establish industry acceptable auditing standards with current best practices and policies. Students will also be prepared to competently take the CPTE exam.

Average Salary for a Penetration Testing Engineer: £62,500 p.a. Source: ITjobswatch

Career paths:

  • Penetration Testing Engineer
  • Pen Tester
  • Ethical Hacker
  • IT Security Consultant
  • IT Security Specialist

Certification

Certified Penetration Testing Engineer (C)PTE)

Awarded by Mile2

Course media

Resources

  • Click here to view our brochure to learn more about Hudson - download

Description

Course areas covered

  • Module 0: Course Overview
  • Module 1: Business & Technical Logistics of Pen Testing
  • Module 2: Linux Fundamentals
  • Module 3: Information Gathering
  • Module 4: Detecting Live Systems
  • Module 5: Enumeration
  • Module 6: Vulnerability Assessments
  • Module 7: Malware Goes Undercover
  • Module 8: Windows Hacking
  • Module 9: Hacking UNIX/Linux
  • Module 10: Advanced Exploitation Techniques
  • Module 11: Pen Testing Wireless Networks
  • Module 12: Networks, Sniffing and IDS
  • Module 13: Injecting the Database
  • Module 14: Attacking Web Technologies
  • Module 15: Project Documentation
  • Module 16: Securing Windows w/ Powershell
  • Module 17: Pen Testing with Powershell

Complete the Reed enquiry form to see a detailed breakdown of the course syllabus.

What does this course include?

  1. Video based course material
  2. E-book
  3. 2 week's live lab access to practice your skills
  4. Exam prep guide
  5. Exam simulator to prepare you for the official exam
  6. Exam voucher to sit the official exam
  7. 2nd shot exam voucher in case you fail

Course Duration and Delivery: 40 hours, online (12 months access)


About the exam

The CPTE exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your Mile2 account. The exam will take 2 hours and consist of 100 multiple choice questions. Further details about the exam are as follows:

  • All exams are immediately loaded in your Mile2 user account once you have enrolled
  • All Mile2 exams are taken on-line and can be taken anywhere 24/7 providing you have access to an internet connection and PC or laptop
  • All exams run for 2 hours and comprise of 100 questions with a passing score of 70%
  • There are NO prerequisites toward taking any Mile2 exam
  • Once you have passed your exam, you will instantly receive a digital copy of your certification

Features of course

  • User Friendly Navigation: Easily navigate through hours of in-depth training videos. Easily navigate through modules and repeat entire topics or even a particular section.
  • Full Video of Instructor: Hours of one on one video with the instructor directly teaching you the skills you need to be successful.
  • Full Video Lab Demonstrations: The instructor will actually perform key tasks in front of you on screen. This format gives the user the power to see things done by a professional in the intended environment as many times as they would like.
  • Info Rich Power Points: Utilizing PowerPoint presentations allows the user to better interpret the material through charts, definitions, graphs, and more.
  • Review Quiz Questions After Every Module: At the end of each module, there is a review quiz to ensure the retention of the information discussed before moving on to a new section.
  • In Depth Study Guide: A handy study guide enables tactile learners to process what they learn, follow along with the videos, and ultimately walk away with a paper based review tool they can return to any time any place.


How is this course taught?

This is an online, self-paced course, meaning you do it in your own home, in your own time, at your own pace. Each lesson is pre-recorded allowing you to pause, fast-forward, skip sections, or go back to another lesson if you need to. Aside from the written notes and mock exam, the lessons are multi-media based, which means video and audio are used to teach the lessons. Most courses are also interactive, prompting the learner to participate. This involves answering on-screen questions at the end of each course through the practice exam.

What do I need?

This is an online course with 24/7 access. You can do it from any where in the world, any time of the day providing you have an internet connection and a device such as a laptop, PC, or Mac. No apps are required to access the courses. You simply do it from your browser. For the best user experience, we recommend Google Chrome.

Who is this course for?

  • Pen Testers
  • Ethical Hackers
  • Network Auditors
  • Cyber Security Professionals
  • Vulnerability Assessors
  • Cyber Security Managers
  • IS Managers

Requirements

Although there are no prerequisites to take the course or sit the exam, it is recommended prospective learners have 12 months’ experience in networking technologies, basic knowledge of Linux, sound knowledge of TCP/IP, knowledge of Microsoft packages. It would also be of benefit if prospective learners possessed the CompTIA Network+ and Security+ certifications.

Career path

  • Penetration Testing Engineer
  • Pen Tester
  • Ethical Hacker
  • IT Security Consultant
  • IT Security Specialist

Questions and answers

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.