Excelin IT Training Career Academy
This Official Mile2® cyber security certification training series covers everything you need to know about becoming a Certified Penetration Testing Engineer. Students will learn about logistics of pen testing, Linux fundamentals, information gathering, detecting live systems, enumeration, vulnerability assessments, malware going undercover, Windows hacking, hacking UNIX/Linux, advanced exploitation techniques, pen testing wireless networks, networks, sniffing and IDS, injecting the database, attacking web technologies, and project documentation.
Becoming a Certified Penetration Testing Engineer lets you use the key elements of penetration testing to keep businesses safe. Ethical hacking is the art of using these penetration testing techniques to identify and repair the latest vulnerabilities in a system to make sure it is secure. This will protect businesses and individuals from malicious hackers. Once inside, hackers can access private information, such as usernames, passwords, credit card numbers, and social security numbers of clients and employees. Certified Penetration Testing Engineers are the solution to prevent hackers from exploiting the businesses they serve.
Having a Certified Penetration Testing Engineer enhances the business by keeping its partners, employees, and clients safe. It increases the ability to identify protection and reduce any risks that could be there for hackers to take advantage of.
Certification Exam Details:
Available CEUs for Course Series Completion: 10
Students can earn up to 10 CEUs for fully completing this course series. This information will be displayed on the certificate of completion.
Module 01 – Logistics of Pen Testing – 5m
Module 02 – Linux Fundamentals – 22m
Module 03 – Information Gathering – 39m
Module 04 – Detecting Live Systems –34m
Module 05 – Enumeration – 25m
Module 06 – Vulnerability Assessments – 20m
Module 07 – Malware Goes Undercover – 28m
Module 08 – Windows Hacking – 39m
Module 09 – Hacking UNIX/Linux – 36m
Module 10 – Advanced Exploitation Techniques – 29m
Module 11 – Pen Testing Wireless Networks – 34m
Module 12 – Networks, Sniffing and IDS – 42m
Module 13 – Injecting the Database – 26m
Module 14 – Attacking Web Technologies – 30m
Module 15 – Project Documentation – 17m
Final Exam Practice
Professional roles include, but are not limited to Ethical Hackers, Security Consultants, System Administrators, and Chief Security Officers.
Rating and reviews
There haven't been any reviews for this course yet.
Please sign in to review this course.
This course is advertised on reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.