top of page
C)PTE | Certified Penetration Testing Engineer

C)PTE | Certified Penetration Testing Engineer


A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system.  You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system.    Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants.

In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk.



The C) PTE exam covers a broad base of Penetration Testing areas to ensure that applicants are able to effectively manage the Penetration Testing process.


What you'll learn:

Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing.

The person who carries this certification should be able to assess a company’s security posture, perform in-depth penetration testing using a variety of assessment tools, and set up dynamic defenses to prevent intrusion. 


Who Should Take This Course:

  • Pen Testers
  • Ethical Hackers
  • Network Auditors
  • Cybersecurity Professionals
  • Vulnerability Assessors
  • Cybersecurity Managers
  • IS Managers


Suggested Prior Knowledge:

  • A minimum of 12 months’ experience in networking technologies
  • Sound knowledge of TCP/IP
  • Knowledge of Microsoft packages
  • Network+, Microsoft, Security+
  • * Basic Knowledge of Linux is essential



Course Introduction

  • Module 1 – Business & Technical Logistics of Pen Testing
  • Module 2 – Information Gathering Reconnaissance – Passive (External Only)
  • Module 3 – Detecting Live Systems – Reconnaissance (Active)
  • Module 4 – Banner Grabbing and Enumeration
  • Module 5 – Automated Vulnerability Assessment
  • Module 6 – Hacking Operating Systems
  • Module 7 – Advanced Assessment and Exploitation Techniques
  • Module 8 – Evasion Techniques
  • Module 9 – Hacking with PowerShell
  • Module 10 – Networks and Sniffing
  • Module 11 – Accessing and Hacking Web Techniques
  • Module 12 – Mobile and IoT Hacking
  • Module 13 – Report Writing Basics
  • Appendix: Linux Fundamentals



  • Lab 1 – Introduction to Pen Testing Setup
  • Lab 2 – Linux Fundamentals
  • Lab 3 – Using Tools for Reporting
  • Lab 4 – Information Gathering
  • Lab 5 – Detecting Live Systems
  • Lab 6 – Enumeration
  • Lab 7 – Vulnerability Assessments
  • Lab 8 – Software Goes Undercover
  • Lab 9 – System Hacking- Windows
  • Lab 10 – System Hacking – Linux
  • Lab 11 – Advanced Vulnerability and Exploitation Techniques
  • Lab 12 – Nework Sniffing/IDS
  • Lab13 – Attacking Databases
  • Lab 14 – Attacking Web Application



Descargue el temario para conocer el detalle completo de los contenidos


Debido a las constantes actualizaciones de los contenidos de los cursos por parte del fabricante, el contenido de este temario puede variar con respecto al publicado en el sitio oficial, sin embargo, Netec siempre entregará la versión actualizada de éste

C)PTE | Certified Penetration Testing Engineer

bottom of page