We are happy to advise you!
1­-855­-778­-7246    Contact

Certified Penetration Testing Engineer (CPTE)


Course Content

A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system. You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system. Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants.

In this course, you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk.

Who should attend

  • Pen Testers
  • Ethical Hackers
  • Network Auditors
  • Cybersecurity Professionals
  • Vulnerability Assessors
  • Cybersecurity Managers
  • IS Managers


This course is part of the following Certifications:


Suggested prior knowledge:

  • A minimum of 12 months' experience in networking technologies
  • Sound knowledge of TCP/IP
  • Knowledge of Microsoft packages
  • Network+, Microsoft, Security+
  • Basic knowledge of Linux is essential

Course Objectives

Once you have completed this course, you will have learned everything you need to know to move forward with a career in penetration testing.

Outline: Certified Penetration Testing Engineer (CPTE)

  • Module 1 - Business & Technical Logistics of Pen Testing
  • Module 2- Information Gathering Reconnaissance - Passive (External Only)
  • Module 3 - Detecting Live Systems - Reconnaissance (Active)
  • Module 4- Banner Grabbing and Enumeration
  • Module 5- Automated Vulnerability Assessment
  • Module 6- Hacking Operating Systems
  • Module 7- Advanced Assessment and Exploitation Techniques
  • Module 8- Evasion Techniques
  • Module 9- Hacking with PowerShell
  • Module 10- Networks and Sniffing
  • Module 11- Accessing and Hacking Web Techniques
  • Module 12- Mobile and IoT Hacking
  • Module 13- Report Writing Basics
  • Appendix: Linux Fundamentals
Online Training

Duration 5 days

  • US$ 3,250
Classroom Training

Duration 5 days

  • United States: US$ 3,250
Click on town name or "Online Training" to book Schedule
This is an Instructor-Led Classroom course
Guaranteed date:   This green checkmark in the Upcoming Schedule below indicates that this session is Guaranteed to Run.
Instructor-led Online Training:   This is an Instructor-Led Online (ILO) course. These sessions are conducted via WebEx in a VoIP environment and require an Internet Connection and headset with microphone connected to your computer or laptop.
  *   This class is delivered by a partner.
United States
Guaranteed to Run Online Training 09:00 US/Central * Enroll
Guaranteed to Run Online Training 09:00 US/Central * Enroll
Online Training 09:00 US/Central * Enroll
X Contact Contact