Certified Penetration Testing Engineer (CPTE)
Penetration testing, also called pen testing or ethical hacking, is that the practice of testing a computing system, network or web application to seek out security vulnerabilities that an attacker could exploit. Penetration testing are often automated with software applications or performed manually. Either way, the method involves gathering information about the target before the test, identifying possible entry points, attempting to interrupt in — either virtually or for real — and reporting back the findings.
The main objective of penetration testing is to spot security weaknesses. Penetration testing also can be wont to test an organization’s security policy, its adherence to compliance requirements, its employees’ security awareness and therefore the organization’s ability to spot and respond to security incidents.
Duration
5 days 40 hours
Module
- Introduction
- Networking
- Linux for pentesters
- Google Dorks
- OSINT
- Advanced scanning techniques
- Packet inspection
- Kali Linux
- Metasploit Framework
- Bypassing Firewalls
- Wireless Security
- Advanced Social Engineering Attacks
- Web application security
- Bug Bounty
- CTF challenges and Pentest projects