M2UPTBOOT - Ultimate Pen Test Bootcamp

We’ve partnered with Mile2 to assemble the ultimate pen testing bootcamp. This 7-day bootcamp is comprised of 5 courses designed to prepare you to earn 4 security certifications. The bootcamp includes the following courses:

C)SP – Certified Security Principles
C)PEH – Certified Professional Ethical Hacker
C)PTE – Certified Penetration Testing Engineer
C)PTC – Certified Penetration Testing Consultant
Red Team vs. Blue Team

THE BOOTCAMP INCLUDES:
Live Class and Self Study
E-Books
Exam Prep & Simulators
Exam Vouchers
Free 2nd Chance Exam
Cyber Range & Lab Guide

THESE COURSES ARE ACCREDITED & APPROVED:
ACCREDITED by the NSA CNSS 4011-4016
MAPPED to NIST / Homeland Security NICCS’s Cyber Security Workforce Framework
APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

Getting prepared for 4 security certifications PLUS the exams would normally cost you $16,950, but sign up for this 7-day Bootcamp and get it all for $5,995!

Student Testimonials

Instructor did a great job, from experience this subject can be a bit dry to teach but he was able to keep it very engaging and made it much easier to focus. Student
Excellent presentation skills, subject matter knowledge, and command of the environment. Student
Instructor was outstanding. Knowledgeable, presented well, and class timing was perfect. Student

Click here to print this page »

Prerequisites


The C)SP and C/PEH is delivered as an Ultimate Self-Study combo and should be studied PRIOR to the Live classes . The C)SP is foundational knowledge and will not be covered in the Live Classes. You will receive the remaining courses as Ultimate Self Study combos as well, however, it is not necessary for you to review those courses in advance of the course.

Detailed Class Syllabus


C)SP – Certified Security Principles


Module 1 – Introduction to IT Security
Module 2 – Risk Management
Module 3 – Understanding of Cryptography
Module 4 – Understanding Identity and Access Management
Module 5 – Managing Data Security
Module 6 – Managing Network Security
Module 7 – Managing Server/Host Security
Module 8 – Application Security for Non-Developers
Module 9 – Understanding Mobile Device Security
Module 10 – Managing Day to Day Security
Module 11 – Understating Compliance and Auditing

C)PEH – Certified Professional Ethical Hacker


Module1 - Introduction to Ethical Hacking
Module 2 - Linux Fundamentals
Module 3 - Protocols
Module 4 - Cryptography
Module 5 - Password Cracking
Module 6 - Malware
Module 7 - Security Devices
Module 8 - Information Gathering - Passive Reconnaissance
Module 9 - Social Engineering
Module 10 - Active Reconnaissance
Module 11 - Vulnerability Assessment
Module 12 - Network Attacks
Module 13 - Hacking Servers
Module 14 - Hacking Web Technologies
Module 15 - Hacking Wireless Networks
Module 16: Maintaining Access and Covering Tracks

C)PTE – Certified Penetration Testing Engineer


Module 1 - Business & Technical Logistics of Pen Testing
Module 2 - Information Gathering Reconnaissance-Passive (External Only)
Module 3 - Detecting Live Systems
Module 4 - Banner Grabbing and Enumeration
Module 5 - Automated Vulnerability Assessments
Module 6 - Hacking an OS
Module 7 - Advanced Assessment and Exploitation Techniques
Module 8 - Evasion Techniques
Module 9 - Hacking with PowerShell
Module 10 - Networks and Sniffing
Module 11 - Hacking Web Tech
Module 12 - Mobile and IoT Hacking
Module 13 - Report Writing Basics

C)PTC – Certified Penetration Testing Consultant


Module 1 – Penetration Testing Team Formation
Module 2 – NMAP Automation
Module 3 – Exploitation Process
Module 4 – Fuzzing with Spike
Module 5 – Simple Buffer Overflow
Module 6 – Stack Based Windows Buffer Overflow
Module 7 – Web Application Security and Exploitation
Module 8 – Linux Stack Smashing & Scanning
Module 9 – Linux Address Space Layout Randomization
Module 10 - Windows Exploit Protection
Module 11- Getting Around SEH ASLR
Module 12 – Penetration Testing Report Writing

Red Team vs. Blue Team


Module 1 – Kali vs. Proximo and Gracchus
Module 2 – Kali vs. Priscus and Verus
Module 3 – Kali vs. Maximus and Quintus
Module 4 – Kali vs. Tetraites and Commodus