Rated 9.1 out of 10 based on over 5897 reviews
The Certified Penetration Testing Engineer is a vendor-neutral course built by Mile2 that will give you industry-recognised, hands-on knowledge in the latest penetration testing tools, including Metasploit, Kali Linux, Microsoft PowerShell. The CPTE course has been developed to take your career in cyber security to the next level through teaching you the very latest penetration testing techniques, boosting your efforts in the war against cybercrime, and making you an in-demand cyber security professional with organisations around the world.
The CPTE will train you in the five key elements of penetration testing, boosting your skillset in protecting business systems:
If you are a current cybersecurity professional looking to gain the industry benchmark in penetration testing knowledge and certifications, then the hands-on CPTE training and qualification are for you. You will need to have relevant experience in networking technologies and preferably already be in a network or security role with a good understanding of operating systems.
The Certified Penetration Testing Engineer qualification will provide you with the relevant skills needed to carry out evaluations relating to the security of computer systems, networks and applications. The demand for professionals in the cybersecurity industry is increasing, and with technological advancements like the Internet of Things, Cloud, and more services that rely on robust defences, there has never been a better time to enter the industry.
You will be able to function in roles including Penetration Tester and Cybersecurity Manager. Most jobs offer salaries of £50,000* and over, highlighting the importance you will have to any organisation you work for, either as a direct employee or consultant.
Module 1 - Business & Technical Logistics of Pen Testing
Module 2 - Information Gathering Reconnaissance - Passive (External Only)
Module 3 - Detecting Live Systems - Reconnaissance (Active)
Module 4 - Banner Grabbing and Enumeration
Module 5 - Automated Vulnerability Assessment
Module 6 - Hacking Operation Systems
Module 7 - Advanced Assessment and Exploitation Techniques
Module 8 - Evasion Techniques
Module 9 - Hacking with PowerShell
Module 10 - Networks and Sniffing
Module 11 - Accessing and Hacking Web Techniques
Module 12 - Mobile and IoT Hacking
Module 13 - Report Writing Basics + Linux Fundamentals
If you are funding your own course, we can provide a multitude of flexible payment plans and pricing options, just some of which are listed below:
Finance is a great way to spread the cost of your purchase. To make it easy, we have teamed up with Deko whose smart technology lets you apply for and complete the loan application quickly and entirely online.
We offer a range of interest free and interest-bearing finance* options to help you spread the cost of your purchase over 12, 24, 36 or 48 months.
You will be only considered for finance if you meet certain eligibility criteria as set out by Deko**.
*Finance is provided through Deko platform by a number of lenders and you will be offered the best rate available based on your credit history and the lenders’ credit decision policy.
** Your application will be assessed based on eligibility, credit history and affordability and Deko will let you know the outcome in just a few seconds. It’s important to know that when applying for finance a hard credit check is made which is recorded on your credit file.