Logo

Maxtrain.com - [email protected] - 513-322-8888 - 866-595-6863

M2-CVA/CPEH/CPTE

CVA +CPEH +CPTE BootCamp

Alert Me

Description

The C)VA Certified Vulnerability Assessor certification course helps students understand the importance of vulnerability assessments by providing intricate knowledge and skills in the Vulnerability Assessment arena. The CVA course provides foundational knowledge of general VA tools as well as popular exploits an IT engineer should be familiar with. 

The C)VA is a fundamental cybersecurity certification course that focuses on vulnerability assessments. The CVA course focuses on foundational information such as the importance of a Vulnerability Assessment and how it can help an engineer prevent serious break-ins to your organization. 

The Certified Professional Ethical Hacker certification course is the foundational training line of penetration testing courses. 

The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack. 

The C)PTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques.

The Certified Penetration Testing Engineer certification course is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by our international group of Penetration Testing Consultants.

The C)PTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation, and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques.

 

Outline

CPTE

Module 0: Course Overview

Module 1: Business & Technical Logistics of Pen Testing

Module 2: Linux Fundamentals

Module 3: Information Gathering

Module 4: Detecting Live Systems

Module 5: Enumeration

Module 6: Vulnerability Assessments

Module 7: Malware Goes Undercover

Module 8: Windows Hacking

Module 9: Hacking UNIX/Linux

Module 10: Advanced Exploitation Techniques

Module 11: Pen Testing Wireless Networks

Module 12: Networks, Sniffing and IDS

Module 13: Injecting the Database

Module 14: Attacking Web Technologies

Module 15: Project Documentation

Module 16: Securing Windows w/ Powershell

Module 17: Pen Testing with Powershell

 CPTE

Lab 1 – Introduction to Pen Testing Setup

Lab 2 – Linux Fundamentals          

Lab 3 – Using tools for reporting

Lab 4 – Information Gathering

Lab 5 – Detecting Live Systems - Scanning Techniques

Lab 6 – Enumeration           

Lab 7 – Vulnerability Assessments           

Lab 8 – Software Goes Undercover

Lab 9 – System Hacking – Windows Hacking

Lab 10 – System Hacking – Linux/Unix Hacking

Lab 11 – Advanced Vulnerability and Exploitation Techniques

Lab 12 – Network Sniffing/IDS       

Lab 13 – Attacking Databases

Lab 14 – Attacking Web Applications

PreRequisites

  • A minimum of 12 months experience in networking technologies
  • Sound knowledge of TCP/IP
  • Knowledge of Microsoft packages
  • Network+, Microsoft, Security+
  • Basic Knowledge of Linux is essential

Audience

  • Pen Testers
  • Ethical Hackers
  • Network Auditors
  • Cyber Security Professionals
  • Vulnerability Assessors
  • Cyber Security Managers
  • IS Managers
$3000.00 List Price

5 Days Course

Class Dates

Request a Date or a Private Class below.


MAX Educ. Savings
Categories: ,
Loading ...