CourseInfo | SimpliTrain

CPTE - Certified Penetration Testing Engineer - ML

Learning plan iconE-Learning

Description

This course teaches students special knowledge and skills in penetration testing. Topics covered include reconnaissance, hacking operating systems, evasion techniques, hacking with PowerShell, mobile and IoT hacking, report writing, and more.

This course teaches students special knowledge and skills in penetration testing. Topics covered include reconnaissance, hacking operating systems, evasion techniques, hacking with PowerShell, mobile and IoT hacking, report writing, and more.

Lesson Id Title Description
1 Business and Technical Logistics for Pen Testing Course Introduction
Business and Technical Logistics for Pen Testing
Where are We?
Overview
What is Penetration Testing?
Today’s Threats
Staying Up To Date
Pen Testing Methodology
Phase 1 – Pre-Engagement Activities
2 - Information Gathering – Reconnaissance-Passive (External Only) Information Gathering – Reconnaissance-Passive (External Only)
Where are We?
Overview
What are we looking for?
Keeping Track of what we find!
Where/How do we find this information?
Are there tools to help?
Countermeasures
3 Detecting Live Systems – Reconnaissance -Active Detecting Live Systems – Reconnaissance -Active
Where are We?
Overview
What are we looking for?
Reaching Out!
Port Scanning
Are there tools to help?
Countermeasures
4 Banner Grabbing & Enumeration Banner Grabbing & Enumeration
Overview
Banner Grabbing
Enumeration
5 Automated Vulnerability Assessment Automated Vulnerability Assessment
Where are we?
Overview
What is a Vulnerability Assessment?
Tools of the Trade
Testing Internal/External Systems
Dealing with the Results
6 Hacking Operating Systems Hacking Operating Systems
Where are We?
Overview
Key Loggers
Password Attacks
Rootkits & Their Friends
Clearing Tracks
7 Advanced Assessment and Exploitation Techniques Advanced Assessment and Exploitation Techniques
Where are We?
Overview
Buffer Overflow
Exploits
Exploit Framework
8 Evasion Techniques Evasion Techniques
Where are We?
Overview
Evading Firewall
Evading Honeypots
Evading IDS
9 Hacking with PowerShell Hacking with PowerShell
Where are We?
Overview
PowerShell - A Few Interesting Items
Finding Passwords with PS
10 Networks, Sniffing, and IDS Networks, Sniffing, and IDS
Where are We?
Overview
Sniffing Techniques
11 Assessing and Hacking Web Technologies Assessing and Hacking Web Technologies
Where are We?
Overview
OWASP Top 10
SQL Injection
XSS
12 Mobile and IoT Hacking Mobile and IoT Hacking
Where are We?
Overview
Quick Introduction
What Devices are we talking about?
What is the risk?
Potential Avenues to Attack
Hardening Mobile/IoT Devices
13 Report Writing Basics Report Writing Basics
Where are We?
Overview
Report Components
Report Results Matrix
Recommendations
Self-Paced

Free

Enroll icon
This course includes: :
Full lifetime access