Obtain real world security knowledge with Mile 2's CPTE Certified Penetration Testing Engineer exclusively at Bitshield!
this coming
September 24-28, 2012
The hottest information security course on Pen Testing has finally arrived in the Philippines with Mile 2's Certified Penetration Testing Engineering Course.
Our course was developed around principles and behaviors used by malicious hackers. The course is taught with this in mind while keeping the focus on professional penetration testing and ensuring the security of information assets.
In CPTE, students will enjoy an in-depth course that is continuously updated to maintain and incorporate changes in the security environment. This course offers up-to-date proprietary labs that have been researched and developed by leading security professionals from around the world.
Be among the firsts in the Philippines and probably in South East Asia to be certified by Mile 2!
The course delivers advanced and cutting edge techniques for auditing a broad range of security controls (including Physical and User Security) with "hands-on" laboratories designed by real world security professionals.
For a Certified Ethical Hacker (CEH), this course will improve your knowledge and skills thus making you a complete "security guru"!
Learn the art of ethical hacking with a professional edge (penetration testing)!
Don't be left out…be among the first Certified Pen Test Engineers in the Philippines!
COURSE OVERVIEW
CPTEngineer's foundation is built firmly upon proven, hands-on,
Penetration Testing methodologies utilized by our international
group of vulnerability consultants. Mile 2 trainers keep abreast of
their field by practicing what they teach. They believe that, during
training, an equal emphasis should be placed on both theoretical
and real world experience if the student is going to succeed in
mastering the necessary skills to become a CPTEngineer.
The CPTEngineer presents information based on the
5 Key Elements of PenTesting: Information Gathering,
Scanning, Enumeration, Exploitation and Reporting.
System vulnerabilities will be discovered using these tried
and true steps alongside the use of the latest hacking
techniques.
This course also enhances the business skills needed by
today's students. It will enable them to identify protection
opportunities, justify testing activities, and optimize security
controls needed by businesses attempting to reduce risks.
mile2 goes far beyond simply teaching students to "Hack".
Mere hacking was the norm for classes that were available
before mile2 has introduced a new methodology in teaching
this advanced skill.
Our course was developed around principles and behaviors used by malicious hackers. The course is taught with this in mind while keeping the focus on professional penetration testing and ensuring the security of information assets.
COURSE OUTLINE
Module 0: Course Overview
Module 1: Business and Technical Logistics of
Pen Testing
Module 2: Financial Sector Regulations
Module 3: Information Gathering
Module 4: Detecting Live Systems
Module 5: Enumeration
Module 6: Vulnerability Assessments
Module 7: Malware, Trojans and Back Doors
Module 8: Windows Hacking
Module 9: Hacking UNIX/Linux
Module 10: Advanced Exploitation Techniques
Module 11: Pen Testing Wireless Networks
Module 12: Networks, Sniffing and IDS
Module 13: Injecting the Database
Module 14: Attacking Web Technologies
Module 15: Report Writing
Appendix 1: The Basics
Appendix 2: Linux Fundamentals
Appendix 3: Access Controls
Appendix 4: Protocols
Appendix 5: Cryptography
Appendix 6: Economics and Law
Duration: 5 days
Inclusion:
Original CPTE kit (mile2 workbooks (2), mile2 lab guide, key concepts/definitions booklet, DVDs with penetration testing tools, white papers, videos & resources, mile2 pen, and mile2 T-shirt)
Exam voucher
AM/PM snacks & lunch
Limited edition Bitshield/mile2 jacket
Limited Seats Only!
Please call us for reservation / inquiry
Tel. (362)654.9537
Or text / call + 639 2610.69134
Look for Jud
We customized trainings based on our clients' needs!!
Bitshield is the only Authorized Training Center of mile2 in the Philippines.
I would appreciate if you could forward this mail internally to your friends & colleagues who would be interested in attending this course.
We practice ethical email distribution. Please accept our sincere apologies if you have received this e-mail in an unsolicited manner. If you don't want to receive from us, kindly reply with the subject "Unsubscribe" to judy@bitshieldsecurity.com.
--
You received this message because you are subscribed to the Google Groups "Virtual University of Pakistan" group.
To post to this group, send email to discussion_vu@googlegroups.com.
To unsubscribe from this group, send email to discussion_vu+unsubscribe@googlegroups.com.
For more options, visit this group at http://groups.google.com/group/discussion_vu?hl=en.
No comments:
Post a Comment