Learn to perform professional penetration tests in this five-day intensive hands-on training. You will go beyond ethical hacking and master the five core elements of penetration testing: information gathering, scanning, enumeration, exploitation and reporting. With over 20 hours of hands-on labs in a Cyber Range environment, you will develop the skills to identify vulnerabilities, exploit systems and deliver clear, actionable assessment reports.
Prepares for this certification
This training prepares you for the official C)PTE certification from Mile2. The exam consists of 100 multiple-choice questions, takes approximately 2 hours and is taken online through the Mile2 Learning Management System. A minimum score of 70% is required to pass. The exam voucher is included with this training, along with a free second attempt (free retake) should you not pass on the first try.
This course is also excellent preparation for these industry certifications:
The Certified Penetration Testing Engineer (C)PTE) training builds on the knowledge gained in the C)PEH (Professional Ethical Hacker) course and takes your skills to a professional level. Where ethical hacking focuses on understanding attack techniques, penetration testing goes a step further: you will learn to use both technical and non-technical methods to breach security measures and assess an organization’s resilience.
The training is built around the proven methodology of Mile2’s international group of penetration testing consultants. You will work with current tools such as Metasploit, Kali Linux and Microsoft PowerShell, and complete a full penetration test from A to Z. The labs start with straightforward activities and build towards complex scenarios, guiding you step by step through a realistic penetration testing model.
In addition to technical skills, you will also learn the business side of penetration testing: how to justify testing activities to management, how to optimize security controls based on business risk, and how to produce a professional assessment report that provides immediate value to the client.
Learning Objectives
Upon completion of this training, you will be able to:
Plan, execute and report on a full penetration test
Perform passive and active reconnaissance to map target systems and networks
Use automated scanning tools to identify and prioritize vulnerabilities
Apply enumeration techniques to networks, systems and applications
Perform exploitation techniques on Windows and Linux systems
Apply advanced post-exploitation and evasion techniques
Test web applications for security vulnerabilities, including SQL injection
Assess wireless networks for vulnerabilities
Produce a professional penetration testing report and communicate findings to stakeholders
Optimize security controls based on test results and business risks
Not satisfied? You will get your money back without questions, without explanation. We want you to be always satisfied. Read more about money back guarantee.
Always certification guarantee via LAI CertProtect
If an employee leaves your organization within 6 months of a training, you can register another employee for the same training free of charge. This way you protect your investment! Read more about LAI CertProtect.
Always the best teachers
LAI has experienced and certified teachers who understand the art of explaining difficult topics in a fun and understandable way. Our teachers are still active in the professional field as consultants on a daily basis.
Always comprehensive advice
Courses and certifications can be complicated. Let our certification experts create a training program for your employees free of charge.
What our students tell us:
{
Excellent trainer and training center, everyone's very nice and kind and perfect professionals!
5
Tihomir Shirov
CNSys PLC
{
Wonderful treatment, kind hosts and the perfect place to gain knowledge.
5
Boyko Kolev
CNSys PLC
{
Very good instructor, which made the training very clear and helpful for me experiencing Aruba Networks
5
Bram van Dongen
Network Engineer
Axians
{
The training was excellent, offering a lot of hands-on labs, though time was a bit tight—but that's expected in an expert-level course. The location was also fantastic, with a great environment, high-quality equipment, and friendly people.
5
Arne van der Meulen
Senior Network Engineer
Axians
{
Have taken multiple trainings. LAI gives a trusted and personal feeling!
5
Brain Reynders
Senior Network Consultant
Prowise
{
Very positive, I approached it with an open mindset and was able to gain a lot of new knowledge that I didn't yet possess about macOS and other Apple Services. Very friendly and knowledgeable trainer, always with a clear answer to questions. Overall very satisfied with this training!
5
Anthony Schepers
Prowise
{
The LAI crew is very helpful, and Peter is an excellent trainer.
Peter is enthusiastic about the topic, not only while teaching but also when he gets questions in labs. It's truly rare to see such a combination.
Makes it fun to learn.
Will definitely come back if I get the chance.
5
Even Myrvold
Network Consultant
Netnordic
{
One of the best trainings I ever had - If not the best! Hans did a really good job at presenting everything in a timely fashion. Really enjoyed it! Can´t recommend any suggestions for improvements, Hans and the LAI Team did a really good job!
Very good training and highly recommended, good handout material.
5
Harry Willemsen
Senior Technical Consultant
Ingram Micro
LAI in numbers
30.000+
students
9.8
customer satisfaction
100%
money back guaranteed
1987
more than 35 years of experience
Questions about this course
If you have any questions about this training, please contact us via [email protected], +31 10 2042220 or via the “get in touch” form below. After we have processed your registration, you will receive a registration confirmation and an invoice that can be paid by bank transfer or credit card.