Become a Member   |   Contact Us   |   Marketplace   |   Sign In
Certified Penetration Testing Engineer (CPTE) Online Training Series

Training Series Overview

This Official Mile2® cyber security certification training series covers everything you need to know about becoming a Certified Penetration Testing Engineer. Students will learn about logistics of pen testing, Linux fundamentals, information gathering, detecting live systems, enumeration, vulnerability assessments, malware going undercover, Windows hacking, hacking UNIX/Linux, advanced exploitation techniques, pen testing wireless networks, networks, sniffing and IDS, injecting the database, attacking web technologies, and project documentation.

Career Path: Professional roles include, but are not limited to Ethical Hackers, Security Consultants, System Administrators, and Chief Security Officers.

Official Mile2® CPTE Training Series Taught By: Tracy Preston

Certification Details

Becoming a Certified Penetration Testing Engineer lets you use the key elements of penetration testing to keep businesses safe. Ethical hacking is the art of using these penetration testing techniques to identify and repair the latest vulnerabilities in a system to make sure it is secure. This will protect businesses and individuals from malicious hackers. Once inside, hackers can access private information, such as usernames, passwords, credit card numbers, and social security numbers of clients and employees. Certified Penetration Testing Engineers are the solution to prevent hackers from exploiting the businesses they serve.

Having a Certified Penetration Testing Engineer enhances the business by keeping its partners, employees, and clients safe. It increases the ability to identify protection and reduce any risks that could be there for hackers to take advantage of.

Certification Exam Details:
Certified Penetration Testing Engineer: Learn More about this certification exam.

Available CEUs for Course Series Completion: 10
Students can earn up to 10 CEUs for fully completing this course series. This information will be displayed on the certificate of completion. Learn More

Access Training Courses Below

Click any of the titles below to launch your videos:

Course 01 - Logistics of Pen TestingAccess Now - No Membership Required 25m

Course 02 - Linux Fundamentals 22m

Course 03 - Information Gathering 39m

Course 04 - Detecting Live Systems 34m

Course 05 - Enumeration 25m

Course 06 - Vulnerability Assessments 20m

Course 07 - Malware Goes Undercover 28m

Course 08 - Windows Hacking 39m

Course 09 - Hacking UNIX/Linux 36m

Course 10 - Advanced Exploitation Techniques 29m

Course 11 - Pen Testing Wireless Networks 34m

Course 12 - Networks, Sniffing and IDS 42m

Course 13 - Injecting the Database 26m

Course 14 - Attacking Web Technologies 30m

Course 15 - Project Documentation 17m

Training Final Exam

Are you ready to earn your certificate of completion? If so, Launch the Final Exam below to do so now!

Training Final Exam