CPTE - Certified Penetration Testing Engineer - ML


E-Learning
Description
This course teaches students special knowledge and skills in penetration testing. Topics covered include reconnaissance, hacking operating systems, evasion techniques, hacking with PowerShell, mobile and IoT hacking, report writing, and more.
This course teaches students special knowledge and skills in penetration testing. Topics covered include reconnaissance, hacking operating systems, evasion techniques, hacking with PowerShell, mobile and IoT hacking, report writing, and more.
| Lesson Id | Title | Description |
|---|---|---|
| 1 | Business and Technical Logistics for Pen Testing |
Course Introduction Business and Technical Logistics for Pen Testing Where are We? Overview What is Penetration Testing? Today’s Threats Staying Up To Date Pen Testing Methodology Phase 1 – Pre-Engagement Activities |
| 2 | - Information Gathering – Reconnaissance-Passive (External Only) |
Information Gathering – Reconnaissance-Passive (External Only) Where are We? Overview What are we looking for? Keeping Track of what we find! Where/How do we find this information? Are there tools to help? Countermeasures |
| 3 | Detecting Live Systems – Reconnaissance -Active |
Detecting Live Systems – Reconnaissance -Active Where are We? Overview What are we looking for? Reaching Out! Port Scanning Are there tools to help? Countermeasures |
| 4 | Banner Grabbing & Enumeration |
Banner Grabbing & Enumeration Overview Banner Grabbing Enumeration |
| 5 | Automated Vulnerability Assessment |
Automated Vulnerability Assessment Where are we? Overview What is a Vulnerability Assessment? Tools of the Trade Testing Internal/External Systems Dealing with the Results |
| 6 | Hacking Operating Systems |
Hacking Operating Systems Where are We? Overview Key Loggers Password Attacks Rootkits & Their Friends Clearing Tracks |
| 7 | Advanced Assessment and Exploitation Techniques |
Advanced Assessment and Exploitation Techniques Where are We? Overview Buffer Overflow Exploits Exploit Framework |
| 8 | Evasion Techniques |
Evasion Techniques Where are We? Overview Evading Firewall Evading Honeypots Evading IDS |
| 9 | Hacking with PowerShell |
Hacking with PowerShell Where are We? Overview PowerShell - A Few Interesting Items Finding Passwords with PS |
| 10 | Networks, Sniffing, and IDS |
Networks, Sniffing, and IDS Where are We? Overview Sniffing Techniques |
| 11 | Assessing and Hacking Web Technologies |
Assessing and Hacking Web Technologies Where are We? Overview OWASP Top 10 SQL Injection XSS |
| 12 | Mobile and IoT Hacking |
Mobile and IoT Hacking Where are We? Overview Quick Introduction What Devices are we talking about? What is the risk? Potential Avenues to Attack Hardening Mobile/IoT Devices |
| 13 | Report Writing Basics |
Report Writing Basics Where are We? Overview Report Components Report Results Matrix Recommendations |
Self-Paced
Free
This course includes: :
Full lifetime access