About This Course
This Official Mile2® cyber security certification training course covers everything you need to know about becoming a Certified Penetration Testing Engineer.
Students will learn about logistics of pen testing, Linux fundamentals, information gathering, detecting live systems, enumeration, vulnerability assessments, malware going undercover, Windows hacking, hacking UNIX/Linux, advanced exploitation techniques, pen testing wireless networks, networks, sniffing and IDS, injecting the database, attacking web technologies, and project documentation.
Our Promise to You
By the end of this course, you will have learned cyber security and penetration testing.
30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about penetration testing in cyber security attacks.
|Section 1 - Logistics Of Pen Testing|
|Logistics Of Pen Testing||00:00:00|
|Section 2 - Linux Fundamentals|
|Section 3 - Information Gathering|
|Section 4 - Detecting Live Systems|
|Detecting Live Systems||00:00:00|
|Section 5 - Enumeration|
|Section 6 - Vulnerability Assessments|
|Section 7 - Malware Goes Undercover|
|Malware Goes Undercover||00:00:00|
|Section 8 - Windows Hacking|
|Section 9 - Hacking UNIX Or Linux|
|Hacking UNIX Or Linux||00:00:00|
|Section 10 - Advanced Exploitation Techniques|
|Advanced Exploitation Techniques||00:00:00|
|Section 11 - Pen Testing Wireless Networks|
|Pen Testing Wireless Networks||00:00:00|
|Section 12 - Networks, Sniffing And IDS|
|Networks, Sniffing And IDS||00:00:00|
|Section 13 - Injecting The Database|
|Injecting The Database||00:00:00|
|Section 14 - Attacking Web Technologies|
|Attacking Web Technologies||00:00:00|
|Section 15 - Project Documentation|