Date: Thu, 20 Oct 2011 09:31:50 +0800 From: Judy Ann <raon.judyann@gmail.com> To: java@freebsd.org Subject: Certified Penetration Testing Engineer Message-ID: <tDcYxL0IjVs3G1xOIBx98rpy099fvOYYNcNdeWb5h49C@gmail.com>
next in thread | raw e-mail | index | archive | help
Catch the Bitshield's grand launching of mile2's CPTE course with trainer s= traight from Europe! Don't miss it! It only happens=2E NOW! Many courses teach "how to hack"; the course teaches "the business of penetration testing"=2E The course delivers advanced and cutting edge techniques for auditing a bro= ad range of security controls (including Physical and User Security) with "= hands-on" laboratories designed by real world security professionals= =2E For a Certified Ethical Hacker (CEH), this course will improve your knowled= ge and skills thus making you a complete "security guru"! Learn the art of ethical hacking with a professional edge (penetration test= ing)! Featuring Europe's top notch and multi-awarded CPTE master instructor DENIZ= KAYA! Don't be left out=2Ebe among the first Certified Pen Test Engineers in the = Philippines! Others compare CEH against CPTE (formerly CPTS) and this is what they say= =2E "CPTE was developed by Mile2 and its security partners as an upgrade from t= he CEH classes previously offered to address the training needs of IT profe= ssionals required in executing the responsibilities of penetrating, analyzi= ng and auditing the security of a network, effectively filling the gap for = a course that goes beyond basic hacking techniques CPTE=A0places=A0emphasis is on methodology, practices, and techniques in as= sessing and verifying security vulnerabilities in networks, connectivity, a= pplications, databases etc=2E CPTE courses are designed with a realization that overloading students with= tools and slides does not necessarily make more effectively security pract= itioners=2E" http://mile2=2Ecom/articles/157-cpte-vs-ceh=2Ehtml "As a veteran of the EC-Council CEH program, Ryan Lindfield , Senior Techni= cal Instructor of Boson Software, has seen CEH's program come a very long way since version 2= =2E0=2E "Many labs have been added, as well as additional chapters and too= ls, in fact, the course content seems to grow by a few pounds with each yea= r that passes," said Lindfield=2E "I have delivered the CEH course approxim= ately 10 times a year for the last 4 years, and while I enjoy the addition = of recent tools, it is difficult to make it through all of the slides, and = make sense of the often poorly written labs=2E" http://mile2=2Ecom/articles= /163-boson-difference-between-cpte-ceh=2Ehtml "I know there is an on going debate about this vs CEH=0B=0BI have my CEH an= d OSCP also=2E=2E=2E=0B=0BOSCP contains more debugging/exploit writing and = technical=2E=2E=2EHowever the CPTE is much better then the CEH on content a= nd delivery=2E" http://www=2Etechexams=2Enet/forums/security-certifications= /58420-passed-cpte-mile2-formerly-cpts=2Ehtml "CEH and CPTS courses are similar in concept (Theoretical basis) and from m= y recent experience are very different in the way they delivered=2E I've fo= und that CEH course was more theoretical with no time left for practical ex= ercises and the instructor has no pen testing experience=2E CPTS course was= delivered by a very experienced instructor and I had a chance to play with= many tools and techniques=2E I felt a bit frustrated after completing CEH = course due to the lack of practice and felt quite confident after finishing= CPTS course=2E CEH Certification is pupular but I found that some people = prefer not to put it on their CV=2E CPTS certification is not yet popular b= ut doesn't have that stigma=2E I have CEH and getting ready for CPTS exam= =2E" http://www=2Eethicalhacker=2Enet/component/option,com_smf/Itemid,54/t= opic,701=2Enew/ COURSE OVERVIEW CPTEngineer's foundation is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by our international group of vulnerability consultants=2E Mile 2 trainers keep abreast of their field by practicing what they teach=2E They believe that, during training, an equal emphasis should be placed on both theoretical and real world experience if the student is going to succeed in mastering the necessary skills to become a CPTEngineer=2E The CPTEngineer presents information based on the 5 Key Elements of PenTesting: Information Gathering, Scanning, Enumeration, Exploitation and Reporting=2E System vulnerabilities will be discovered using these tried and true steps alongside the use of the latest hacking techniques=2E This course also enhances the business skills needed by today's students=2E It will enable them to identify protection opportunities, justify testing activities, and optimize security controls needed by businesses attempting to reduce risks=2E mile2 goes far beyond simply teaching students to "Hack"=2E Mere hacking was the norm for classes that were available before mile2 has introduced a new methodology in teaching this advanced skill=2E Our course was developed around principles and behaviors used by malicious = hackers=2E The course is taught with this in mind while keeping the focus o= n professional penetration testing and ensuring the security of information= assets=2E COURSE OUTLINE Module 0: Course Overview Module 1: Business and Technical Logistics of Pen Testing Module 2: Financial Sector Regulations Module 3: Information Gathering Module 4: Detecting Live Systems Module 5: Enumeration Module 6: Vulnerability Assessments Module 7: Malware, Trojans and Back Doors Module 8: Windows Hacking Module 9: Hacking UNIX/Linux Module 10: Advanced Exploitation Techniques Module 11: Pen Testing Wireless Networks Module 12: Networks, Sniffing and IDS Module 13: Injecting the Database Module 14: Attacking Web Technologies Module 15: Report Writing Appendix 1: The Basics Appendix 2: Linux Fundamentals Appendix 3: Access Controls Appendix 4: Protocols Appendix 5: Cryptography Appendix 6: Economics and Law SPEAKER PROFILE DENIZ KAYA Multi-awarded IT Security and Networking Consultant CPTE Master Deniz Kaya's Summary Cisco ASA and PIX Firewalls, IOS & Zone Based Firewall (ZBF), Cisco IPS App= liances and AIP-SSM modules, Cisco Wireless LAN Controller Appliances and W= iSMs, Cisco Wireless Control System WCS, Cisco Switches 6500 Sup720, 4500, = 3750, 3560, 2960 series, IBM AS400&iSeries, IPSEC VPN, EZVPN, DMVPN, SSLVPN= , GETVPN, PKI enabled VPN, Ironport Email & Web, and Management appliances,= Penetration Testing, Network Security Review and Hardening, CiscoWorks, Ci= sco Routers, EIGRP, OSPF, BGP, Cisco Unified Communication Manager, IP Tele= phony, Radius, Tacacs, Proxy Servers, Microsoft Active Directory, Microsoft= NAP, Failover Clustering, MS Network Load Balancing, Business Continuity P= lanning, Disaster Recovery=2E Specialties Certified Cisco Systems Instructor (CCSI), CCIE Security Written, CCNP, CCN= P Security, CCSP, Cisco Ironport Certified Security Instructor & Profession= al (CICSI & CICSP), Certified Penetration Testing Specialist/Engineer (CPTS= /CPTE), Certified Ethical Hacker (CEH), Certified Disaster Recovery Enginee= r (CDRE), Microsoft Certified Trainer (MCT) and Microsoft Certified System = Engineer (MCSE) To register, please call: (63 2) 840=2E2612 (63 2) 893=2E8527 Look for Judy! E-Mail: judy@bitshieldsecurity=2Ecom sales@bitshieldsecurity=2Ecom www=2Ebitshieldsecurity=2Ecom Duration: 5 days Investment Fee: P120, 000 + VAT (Regular Price - if payment is done after October 31, 2011)= P88,000 + VAT (Early Bird - if payment is done on or before October 31, 201= 1) Inclusion: Original CPTE kit (mile2 workbooks (2), mile2 lab guide, key concepts/defin= itions booklet,=A0 DVDs with penetration testing tools, white papers, video= s & resources, mile2 pen, and mile2 T-shirt) Exam voucher AM/PM snacks & lunch Limited edition Bitshield/mile2 jacket (available only for the grand launc= hing class) Date: November 21-25, 2011 Location: St=2E Giles Hotel Makati Avenue corner Kalayaan Avenue, Makati City, Philippines Hurry, register now! Limited slots available! This is a first-come first-served basis=2E Your payment serves as the conf= irmation of your seat=2E Bitshield is the only Authorized Training Center of mile2 in the Philippine= s=2E We practice ethical email distribution=2E Please accept our sincere apologi= es if you have received this e-mail in an unsolicited manner=2E If you don'= t want to receive from us, kindly reply with the subject "Unsubscribe" to= =A0sales@bitshieldsecurity=2Ecom
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?tDcYxL0IjVs3G1xOIBx98rpy099fvOYYNcNdeWb5h49C>