Cyber Security Penetration Certified Penetration Testing Engineer (CPTE)

Certified Penetration Testing Engineer (CPTE)


Date of Class:


Last Day To Enroll:

3000.00 3,000.00

  • Course Delivery: Virtual Classroom
  • Duration: 5
  • Language: English

Chat Live | Contact Us | Toll Free: (888) 360-8764

More About This Course

  • Train Anywhere, Your Home, Office, Or Training Center
  • Hands on Computer Labs Accessible 24/7
  • Virtual Classrooms With Robust Interactive Environment
  • Prepares You For Exams And Valuable Microsoft Certifications
  • Version Upgrade Guarantee - Substantial Discounts For Upgraded Courses Within 9 Months of Purchase
  • Corporate Resource Guarantee - Protect Your Company Sponsored Training Investment For 1 Year
  • Software Assurance Qualified - Value: 5



The Certified Penetration Testing Engineer course trains students on the 5 key elements of penetration testing: information gathering, scanning, enumeration, exploitation and reporting. Ethical hacking is the art of using these penetration testing techniques to identify and repair the latest vulnerabilities in a system to make sure it is secure. Malicious hackers use these same techniques to find the same vulnerabilities except they exploit the vulnerabilities giving them access to the businesses network. Once inside, hackers can access private information, such as usernames, passwords, credit card numbers, and social security numbers of clients and employees. It’s very likely this data will be held for ransom or sold off on a black market. Hackers are constantly looking for new companies they can exploit; when they come across yours, will they be able to gain access? Certified Penetration Testing Engineers are the solution to prevent this from happening to businesses they serve.

With our proprietary penetration testing lab exercises, students will spend about 20 hours getting real-world penetration testing experience. They'll know what they are learning and they'll know how to use it after course. Our instructors will also provide real life examples of when to use the techniques that are being taught. There is no better way to learn the art of penetration testing.

This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk.


The National Security Agency has validated the CISSO for the following security standards:

NSTISSI - 4011: National Training Standard for Information Systems Security (INFOSEC)
CNSSI - 4012: National Information Assurance Training Standard for Senior Systems Managers


The CPTE is a course on penetration testing designed for those who already have a basic understanding of cyber security. We recommend an understanding of how computers are networked and how they interact with the internet (TCP/IP). Some of the tools we will use are only developed for Linux; therefor having experience with Linux is a plus. We recommend having the previously mentioned experience or you can prepare to take the course by completing the CISSO: Certified Information Systems Officer course as a prerequisite. People who are in or are going into the following professional roles will especially benefit from our course:

Penetration Testing Consultant        Security Analyst/Consultant              Security Architect

Chief Information Security Officer   Security Auditor                                   IT Management

Topics Covered

With 15 up-to-date Modules and 16 Labs, the CPTE will not only teach you the know-how of penetration testing, but you'll have real-world experience to solidify what you have learned.               


  •    Logistics of Penetration Testing
  •    Linux Fundamentals
  •    Information Gathering
  •    Detecting Live System
  •    Enumeration
  •    Vulnerability Assessments
  •    Malware Goes Undercover
  •    Windows Hacking
  •    Hacking UNIX/Linux
  •    Advanced Exploitation Techniques
  •    Pen Testing Wireless Networks
  •    Networks, Sniffing, IDS
  •    Injecting the Database
  •    Attacking Web Technologies
  •    Project Documentation

A1.  Understanding Penetration Testing

A2.  Financial Sector Regulations

A3.  Access Controls

A4.  Protocols

A5.  Cryptography

A6.  Economics and Law


  •    Getting Set Up
  •    Linux Fundamentals
  •    Information Gathering
  •    Detecting Live Systems
  •    Reconnaissance
  •    Vulnerability Assessment
  •    Malware
  •    Window Hacking
  •    Hacking UNIX/Linux
  •    Advanced Exploitation Techniques
  •    Attacking Wireless Networks
  •    Networks, Sniffing and IDS
  •    Database Hacking
  •    Hacking Web Applications

A5:  Cryptography
Post-Class Core Impact

Subject Matter Expert

360training, powered by QuickStart brings a quarter-century of keeping pace with the ever-evolving IT industry. You'll find that experience reflected in every course, and every training modality we offer. We train more than 11,000 IT professionals and developers annually, and 97% of them say they're very glad they chose us!

Got questions? Contact us below or call 877-881-2235

Why Choose

  • Fast and easy courses completion
  • Get an education faster than at traditional colleges!
  • 100% online - No classroom attendance required.
  • Unlimited 24x7 online customer support
  • Over 500,000+ certified nationwide.