Table of Contents
Description
The Ultimate Penetration Testing Bootcamp (C)PEH + C)PTE) combines two core courses from the Mile2 Prevention track into one efficient package. The structure is intentional: you start with the C)PEH as self-study, allowing you to master the fundamentals of ethical hacking at your own pace. You then use that knowledge as a foundation to step directly into the five-day (virtual) instructor-led C)PTE training, where the focus is on professional penetration testing with intensive hands-on labs.
During the C)PEH component, you learn the value of vulnerability assessments and how to use them to strengthen the security of information systems. You gain insight into how malware, viruses and other attack techniques work and how to implement countermeasures. This forms the theoretical foundation for the C)PTE component.
In the C)PTE component, you take the next step and learn to master the five core elements of professional penetration testing: information gathering, scanning, enumeration, exploitation and reporting. You work with current tools such as Metasploit, Kali Linux and Microsoft PowerShell in the Cyber Range environment. With more than 20 hours of hands-on labs, you complete an end-to-end penetration test, including professional reporting.
The Ultimate Penetration Testing Bootcamp (C)PEH + C)PTE) is the most cost-effective way to achieve both certifications and is ideal for professionals who want to enter the penetration testing field quickly and effectively.
Training objectives
Upon completion of this bootcamp, you will be able to:
- Perform vulnerability assessments and translate the results into security improvements
- Understand attack techniques, malware and exploits, and implement countermeasures
- Plan, execute and report a full penetration test
- Perform passive and active reconnaissance to map target systems
- Deploy automated scanning tools to identify and prioritize vulnerabilities
- Apply exploitation techniques to Windows and Linux systems
- Perform advanced post-exploitation and evasion techniques
- Test web applications and wireless networks for vulnerabilities
- Produce a professional penetration test report for clients and stakeholders
Structure of the Ultimate Penetration Testing Bootcamp (C)PEH + C)PTE)
Phase 1: C)PEH – Professional Ethical Hacker (self-study, 40 hours)
Self-study with full digital courseware and video materials. You learn the fundamentals of ethical hacking, vulnerability assessments, attack techniques and countermeasures. This phase prepares you for the instructor-led C)PTE training.
Phase 2: C)PTE – Penetration Testing Engineer (5 days instructor-led/virtual, 40 hours)
Intensive hands-on training with Cyber Range Labs. You complete the full penetration testing model: from information gathering and scanning to exploitation and professional reporting. The labs start with straightforward activities and build up to complex, realistic scenarios.
Prerequisites
The following prior knowledge is recommended:
- Mile2 Certified Vulnerability Assessor (C)VA) or equivalent knowledge
- A minimum of 12 months of experience with network technologies
- Solid knowledge of TCP/IP
- Knowledge of Microsoft products
- Basic knowledge of Linux is essential
Target audience
- Penetration Testers (in training)
- Ethical Hackers
- Network Auditors
- Cybersecurity Professionals
- Vulnerability Assessors looking to advance into penetration testing
- IS Managers
Topics C)PEH (self-study)
- Introduction to Ethical Hacking – Methodologies, legal framework and planning
- Vulnerability Assessments – Identifying and evaluating vulnerabilities
- Malware, Viruses and Attack Techniques – Understanding attack methods and implementing countermeasures
- Network and System Hacking – Attack techniques on networks and systems
- Web Application Hacking – Vulnerabilities in web applications
- Countermeasures and Defense – Defense strategies and security measures
Topics C)PTE (instructor-led)
- Business and Technical Logistics of Pen Testing – Planning, scoping and Rules of Engagement
- Linux Fundamentals – Essential Linux commands for penetration testing
- Information Gathering – Passive and active reconnaissance, OSINT techniques
- Detecting Live Systems – Host discovery and service identification
- Enumeration – Systematically mapping users, services and vulnerabilities
- Vulnerability Assessments – Automated scanning and prioritizing vulnerabilities
- Malware Goes Undercover – Evasion techniques and detection bypass
- Windows Hacking – Exploitation, privilege escalation and lateral movement
- Hacking UNIX/Linux – Attack techniques for UNIX and Linux environments
- Advanced Exploitation Techniques – Post-exploitation, pivoting and persistence
- Pen Testing Wireless Networks – Assessing and exploiting wireless networks
- Networks, Sniffing and IDS – Network analysis and bypassing intrusion detection
- Injecting the Database – SQL injection and database exploitation
- Attacking Web Technologies – Exploiting web application vulnerabilities
- Project Documentation – Professional reporting and recommendations
Follow-up course
The Certified Penetration Testing Consultant (C)PTC) is the follow-up training to this Ultimate Penetration Testing Bootcamp (C)PEH + C)PTE).