Certified Penetration Testing Engineer

Judy Ann raon.judyann at gmail.com
Thu Oct 20 03:19:28 UTC 2011


Catch the Bitshield's grand launching of mile2's CPTE course with trainer straight from Europe!  Don't miss it!  It only happens. NOW!
Many courses teach "how to hack";
the 	course
teaches "the business of penetration testing".



The course delivers advanced and cutting edge techniques for auditing a broad range of security controls (including Physical and User Security) with "hands-on" laboratories designed by real world security professionals.

For a Certified Ethical Hacker (CEH), this course will improve your knowledge and skills thus making you a complete "security guru"!

Learn the art of ethical hacking with a professional edge (penetration testing)!
Featuring Europe's top notch and multi-awarded CPTE master instructor DENIZ KAYA!

Don't be left out.be among the first Certified Pen Test Engineers in the Philippines!

Others compare CEH against CPTE (formerly CPTS) and this is what they say.

"CPTE was developed by Mile2 and its security partners as an upgrade from the CEH classes previously offered to address the training needs of IT professionals required in executing the responsibilities of penetrating, analyzing and auditing the security of a network, effectively filling the gap for a course that goes beyond basic hacking techniques
CPTE places emphasis is on methodology, practices, and techniques in assessing and verifying security vulnerabilities in networks, connectivity, applications, databases etc.
CPTE courses are designed with a realization that overloading students with tools and slides does not necessarily make more effectively security practitioners."  http://mile2.com/articles/157-cpte-vs-ceh.html
"As a veteran of the EC-Council CEH program, Ryan Lindfield , Senior Technical Instructor of Boson
Software, has seen CEH's program come a very long way since version 2.0.  "Many labs have been added, as well as additional chapters and tools, in fact, the course content seems to grow by a few pounds with each year that passes," said Lindfield. "I have delivered the CEH course approximately 10 times a year for the last 4 years, and while I enjoy the addition of recent tools, it is difficult to make it through all of the slides, and make sense of the often poorly written labs." http://mile2.com/articles/163-boson-difference-between-cpte-ceh.html

"I know there is an on going debate about this vs CEHI have my CEH and OSCP also...OSCP contains more debugging/exploit writing and technical...However the CPTE is much better then the CEH on content and delivery." http://www.techexams.net/forums/security-certifications/58420-passed-cpte-mile2-formerly-cpts.html

"CEH and CPTS courses are similar in concept (Theoretical basis) and from my recent experience are very different in the way they delivered. I've found that CEH course was more theoretical with no time left for practical exercises and the instructor has no pen testing experience. CPTS course was delivered by a very experienced instructor and I had a chance to play with many tools and techniques. I felt a bit frustrated after completing CEH course due to the lack of practice and felt quite confident after finishing CPTS course.  CEH Certification is pupular but I found that some people prefer not to put it on their CV. CPTS certification is not yet popular but doesn't have that stigma. I have CEH and getting ready for CPTS exam."  http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,701.new/


COURSE OVERVIEW

CPTEngineer's foundation is built firmly upon proven, hands-on,
Penetration Testing methodologies utilized by our international
group of vulnerability consultants. Mile 2 trainers keep abreast of
their field by practicing what they teach. They believe that, during
training, an equal emphasis should be placed on both theoretical
and real world experience if the student is going to succeed in
mastering the necessary skills to become a CPTEngineer.

The CPTEngineer presents information based on the
5 Key Elements of PenTesting: Information Gathering,
Scanning, Enumeration, Exploitation and Reporting.


System vulnerabilities will be discovered using these tried
and true steps alongside the use of the latest hacking
techniques.

This course also enhances the business skills needed by
today's students. It will enable them to identify protection
opportunities, justify testing activities, and optimize security
controls needed by businesses attempting to reduce risks.
mile2 goes far beyond simply teaching students to "Hack".
Mere hacking was the norm for classes that were available
before mile2 has introduced a new methodology in teaching
this advanced skill.

Our course was developed around principles and behaviors used by malicious hackers. The course is taught with this in mind while keeping the focus on professional penetration testing and ensuring the security of information assets.

COURSE OUTLINE

Module 0: Course Overview
Module 1: Business and Technical Logistics of
     Pen Testing
Module 2: Financial Sector Regulations
Module 3: Information Gathering
Module 4: Detecting Live Systems
Module 5: Enumeration
Module 6: Vulnerability Assessments
Module 7: Malware, Trojans and Back Doors
Module 8: Windows Hacking
Module 9: Hacking UNIX/Linux
Module 10: Advanced Exploitation Techniques
Module 11: Pen Testing Wireless Networks
Module 12: Networks, Sniffing and IDS
Module 13: Injecting the Database
Module 14: Attacking Web Technologies
Module 15: Report Writing
Appendix 1: The Basics
Appendix 2: Linux Fundamentals
Appendix 3: Access Controls
Appendix 4: Protocols
Appendix 5: Cryptography
Appendix 6: Economics and Law

SPEAKER PROFILE

DENIZ KAYA
Multi-awarded IT Security and Networking Consultant
CPTE Master

Deniz Kaya's Summary
Cisco ASA and PIX Firewalls, IOS & Zone Based Firewall (ZBF), Cisco IPS Appliances and AIP-SSM modules, Cisco Wireless LAN Controller Appliances and WiSMs, Cisco Wireless Control System WCS, Cisco Switches 6500 Sup720, 4500, 3750, 3560, 2960 series, IBM AS400&iSeries, IPSEC VPN, EZVPN, DMVPN, SSLVPN, GETVPN, PKI enabled VPN, Ironport Email & Web, and Management appliances, Penetration Testing, Network Security Review and Hardening, CiscoWorks, Cisco Routers, EIGRP, OSPF, BGP, Cisco Unified Communication Manager, IP Telephony, Radius, Tacacs, Proxy Servers, Microsoft Active Directory, Microsoft NAP, Failover Clustering, MS Network Load Balancing, Business Continuity Planning, Disaster Recovery.
Specialties
Certified Cisco Systems Instructor (CCSI), CCIE Security Written, CCNP, CCNP Security, CCSP, Cisco Ironport Certified Security Instructor & Professional (CICSI & CICSP), Certified Penetration Testing Specialist/Engineer (CPTS/CPTE), Certified Ethical Hacker (CEH), Certified Disaster Recovery Engineer (CDRE), Microsoft Certified Trainer (MCT) and Microsoft Certified System Engineer (MCSE)
To register, please call:

(63 2) 840.2612
(63 2) 893.8527

Look for Judy!

E-Mail:
judy at bitshieldsecurity.com
sales at bitshieldsecurity.com
www.bitshieldsecurity.com

Duration:
5 days
Investment Fee:
P120, 000 + VAT (Regular Price - if payment is done after October 31, 2011)
P88,000 + VAT (Early Bird - if payment is done on or before October 31, 2011)
Inclusion:
Original CPTE kit (mile2 workbooks (2), mile2 lab guide, key concepts/definitions booklet,  DVDs with penetration testing tools, white papers, videos & resources, mile2 pen, and mile2 T-shirt)
	Exam voucher
	AM/PM snacks & lunch
	Limited edition Bitshield/mile2 jacket (available only for the grand launching class)
Date:
November 21-25, 2011
Location:
St. Giles Hotel
Makati Avenue corner Kalayaan Avenue, Makati City, Philippines


Hurry, register now! Limited slots available!

This is a first-come first-served basis.  Your payment serves as the confirmation of your seat.



Bitshield is the only Authorized Training Center of mile2 in the Philippines.


We practice ethical email distribution. Please accept our sincere apologies if you have received this e-mail in an unsolicited manner. If you don't want to receive from us, kindly reply with the subject "Unsubscribe" to sales at bitshieldsecurity.com





More information about the freebsd-ports mailing list