AVSec Academy AVSec Academy

Mile2 Authorized Training Center

Επίσημο Εξουσιοδοτημένο Κέντρο Εκπαίδευσης Mile2

Certificate ID / Αριθμός Πιστοποιητικού29772-177-521-7398
Issued / Εκδόθηκε04/03/2026
Valid through / Ισχύει έως04/02/2029
mile2

Accredited by / Διαπιστευμένο από

FBICNSSNISTNICCS

Mile2 C)PTE — Certified Penetration Testing Engineer (Self-Study)

999,00 (excl. VAT)

✅ What’s Included: This Ultimate Combo includes the exam voucher and one free retry — giving you two attempts per exam at no additional cost.

🎓 How You Get Access: After your purchase, you will receive a Mile2 voucher code via email within 24 hours. Redeem it at mile2.com/redeem-a-voucher to activate your course — at no extra cost on Mile2. Course access is valid for 12 months. See the full step-by-step guide →

📧 academy@avsecadvisory.eu | ☎ +30 210 444 5684 | AvSecAdvisory | VAT: EL102286924

SKU: MILE2-CPTE-SS Category:

Course and Certification Learning Options

Detailed Outline:

Module 1 – Business and Technical Logistics of Pen Testing

  • Section 1 – What is Penetration Testing?
  • Section 2 – Today’s Threats
  • Section 3 – Staying up to Date
  • Section 4 – Pen Testing Methodology
  • Section 5 – Pre-Engagement Activities

Module 2 – Information Gathering Reconnaissance – Passive (External Only)

  • Section 1 – What are we looking for?
  • Section 2 – Keeping Track of what we find!
  • Section 3 – Where/How do we find this Information?
  • Section 4 – Are there tools to help?
  • Section 5 – Countermeasures

Module 3 – Detecting Live Systems – Reconnaissance (Active)

  • Section 1 – What are we looking for?
  • Section 2 – Reaching Out!
  • Section 3 – Port Scanning
  • Section 4 – Are there tools to help?
  • Section 5 – Countermeasure

Module 4 – Banner Grabbing and Enumeration

  • Section 1 – Banner Grabbing
  • Section 2 – Enumeration

Module 5 – Automated Vulnerability Assessment

  • Section 1 – What is a Vulnerability Assessment?
  • Section 2 – Tools of the Trade
  • Section 3 – Testing Internal/External Systems
  • Section 4 – Dealing with the Results

Module 6 – Hacking Operating Systems

  • Section 1 – Key Loggers
  • Section 2 – Password Attacks
  • Section 3 – Rootkits & Their Friends
  • Section 4 – Clearing Tracks

Module 7 – Advanced Assessment and Exploitation Techniques

  • Section 1 – Buffer Overflow
  • Section 2 – Exploits
  • Section 3 – Exploit Framework

Module 8 – Evasion Techniques

  • Section 1 – Evading Firewall
  • Section 2 – Evading Honeypots
  • Section 3 – Evading IDS

Module 9 – Hacking with PowerShell

  • Section 1 – PowerShell – A Few Interesting Items
  • Section 2 – Finding Passwords with PowerShell

Module 10 – Networks and Sniffing

  • Section 1 – Sniffing Techniques

Module 11 – Accessing and Hacking Web Techniques

  • Section 1 – OWASP Top 10
  • Section 2 – SQL Injection
  • Section 3 – XSS

Module 12 – Mobile and IoT Hacking

  • Section 1 – What devices are we talking about?
  • Section 2 – What is the risk?
  • Section 3 – Potential Avenues to Attack
  • Section 4 – Hardening Mobile/IoT Devices

Module 13 – Report Writing Basics

  • Section 1 – Report Components
  • Section 2 – Report Results Matrix
  • Section 3 – Recommendations

Reviews

There are no reviews yet.

Be the first to review “Mile2 C)PTE — Certified Penetration Testing Engineer (Self-Study)”

Your email address will not be published. Required fields are marked *

💳 We accept: Credit/Debit Card · PayPal · Apple Pay · Google Pay · Klarna (Buy Now, Pay Later)  |  To pay with Klarna, add items to cart and click “Proceed to Checkout”.
Scroll to Top