Booking options
Price on Enquiry
Price on Enquiry
Delivered Online
5 days
All levels
Duration
5 Days
30 CPD hours
This course is intended for
Pen Testers
Ethical Hackers
Network Auditors
Cybersecurity Professionals
Vulnerability Assessors
Cybersecurity Managers
IS Managers
Overview
A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system. You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system. Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants. In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing.
A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system.ÿ You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system.ÿ ÿ Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants.ÿ In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing.
Course Outline
Business & Technical Logistics of Pen Testing
Information Gathering Reconnaissance ? Passive (External Only)
Detecting Live Systems ? Reconnaissance (Active)
Banner Grabbing and Enumeration
Automated Vulnerability Assessment
Hacking Operating Systems
Advanced Assessment and Exploitation Techniques
Evasion Techniques
Hacking with PowerShell
Networks and Sniffing
Accessing and Hacking Web Techniques
Mobile and IoT Hacking
Report Writing Basics
Nexus Human, established over 20 years ago, stands as a pillar of excellence in the realm of IT and Business Skills Training and education in Ireland and the UK....