De vendor-onafhankelijke Certified Penetration Testing Engineer certificeringstraining is gebouwd op bewezen, hands-on, Penetration Testing-methodologieën die worden gebruikt door onze internationale groep van Penetration Testing Consultants.

De C) PTE behandeld de 5 belangrijkste elementen van pentest; Informatie verzamelen, scannen, telling, exploitatie en rapportage. 

The visual above shows how the courses for the penetration testing track build on one another to steadily expand competence in this specialization. This link will take you to an overview of all Mile2 courses.

Short description

This course covers the methodologies of penetration testing plus the toolsets used to perform such tests. Additionally the course will enhance the skills used to reduce internet exposure risk.

Expanded description

The, vendor neutral, Certified Penetration Testing Engineer certification, C)PTE, course is built upon proven, hands-on, Penetration Testing methodologies utilized by our international group of Penetration Testing consultants. The C)PTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated to working with the internet. The student will be using the latest tools, such as Saint, Metasploit through Kali Linux and Microsoft Power Shell. Mile2 goes far beyond simply teaching you to “Hack”. The C)PTE was developed around principles and behaviors used to combat malicious hackers and focuses on professional penetration testing rather than “ethical hacking”.Besides utilizing ethical hacking methodologies, the student should be prepared to learn penetration testing methodologies using advanced persistent threat techniques. In this course, you will go through a complete penetration test from A-Z! You’ll learn to create your own assessment report and apply your knowledge immediately in the work force.


  1. C)PTC Online Video
  2. C)PTC Electronic Book (Workbook/Lab guide)
  3. C)PTC Exam Prep Questions
  4. C)PTC Exam
  5. 2 weeks Cyber Range access  (Request login from Mile 2 when it suits you)


A student needs to meet the following prequisites in order to fully benefit from the course:

  • A minimum of 12 months’ experience in networking technologies
  • Sound knowledge of TCP/IP
  • Knowledge of Microsoft packages: Network+, Microsoft, Security+
  • Basic Knowledge of Linux is essential

Who should attend

This course was designed for the benefit of the following organization roles:

  • Pen Testers
  • Ethical Hackers
  • Network Auditors
  • Cyber Security Professionals
  • Vulnerability Assessors
  • Cyber Security Managers
  • IS Managers

Course outcome

Upon completion, Certified Penetration TestingEngineer students will be able to establish industry acceptable auditing standards with current best practices and policies.

Course outline:

  • Module 0 – Cursusoverzicht
  • Module 1 – Bedrijfs- en technische logistiek van pentesten
  • Module 2 – Linux Fundamentals
  • Module 3 – Informatie verzamelen
  • Module 4 – Detecteren van live systemen
  • Module 5 – Opsomming
  • Module 6 – Kwetsbaarheidsbeoordelingen
  • Module 7 – Malware gaat undercover
  • Module 8 – Windows-hacking
  • Module 9 – Hacking van UNIX / Linux
  • Module 10 – Geavanceerde exploitatietechnieken
  • Module 11 – Pen testen van draadloze netwerken
  • Module 12 – Netwerken, snuiven en IDS
  • Module 13  – Injecteren van de database
  • Module 14 – Aanvallen op webtechnologieën
  • Module 15 – Projectdocumentatie
  • Module 16 – Windows beveiligen met Powershell
  • Module 17 – Penonderzoek met Powershell

Lab outline:

  • Lab 1 – Introductie tot Pen Testing Setup
  • Lab 2 – Linux Fundamentals
  • Lab 3 – Tools gebruiken voor rapportage
  • Lab 4 – Informatie verzamelen
  • Lab 5 – Detecteren van live systemen
  • Lab 6 – Opsomming
  • Lab 7 – Kwetsbaarheidsbeoordelingen
  • Lab 8 – Software gaat undercover
  • Lab 9 – Systeemhacken – Windows
  • Lab 10 – Systeemhacken – Linux / Unix-hacking
  • Lab 11 – Gevorderd beveiligingslek en
  • Lab 12 – Netwerksnuiven / IDS
  • Lab 13 – Aanvallende databases
  • Lab 14 – Aanvallen webapplicaties


 875,00 (excl. BTW)
Offerte aanvragen