Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 20 Oct 2011 09:31:50 +0800
From:      Judy Ann <raon.judyann@gmail.com>
To:        java@freebsd.org
Subject:   Certified Penetration Testing Engineer
Message-ID:  <tDcYxL0IjVs3G1xOIBx98rpy099fvOYYNcNdeWb5h49C@gmail.com>

next in thread | raw e-mail | index | archive | help
Catch the Bitshield's grand launching of mile2's CPTE course with trainer s=
traight from Europe!  Don't miss it!  It only happens=2E NOW!
Many courses teach "how to hack";
the 	course
teaches "the business of penetration testing"=2E



The course delivers advanced and cutting edge techniques for auditing a bro=
ad range of security controls (including Physical and User Security) with "=
hands-on" laboratories designed by real world security professionals=
=2E

For a Certified Ethical Hacker (CEH), this course will improve your knowled=
ge and skills thus making you a complete "security guru"!

Learn the art of ethical hacking with a professional edge (penetration test=
ing)!
Featuring Europe's top notch and multi-awarded CPTE master instructor DENIZ=
 KAYA!

Don't be left out=2Ebe among the first Certified Pen Test Engineers in the =
Philippines!

Others compare CEH against CPTE (formerly CPTS) and this is what they say=
=2E

"CPTE was developed by Mile2 and its security partners as an upgrade from t=
he CEH classes previously offered to address the training needs of IT profe=
ssionals required in executing the responsibilities of penetrating, analyzi=
ng and auditing the security of a network, effectively filling the gap for =
a course that goes beyond basic hacking techniques
CPTE=A0places=A0emphasis is on methodology, practices, and techniques in as=
sessing and verifying security vulnerabilities in networks, connectivity, a=
pplications, databases etc=2E
CPTE courses are designed with a realization that overloading students with=
 tools and slides does not necessarily make more effectively security pract=
itioners=2E"  http://mile2=2Ecom/articles/157-cpte-vs-ceh=2Ehtml
"As a veteran of the EC-Council CEH program, Ryan Lindfield , Senior Techni=
cal Instructor of Boson
Software, has seen CEH's program come a very long way since version 2=
=2E0=2E  "Many labs have been added, as well as additional chapters and too=
ls, in fact, the course content seems to grow by a few pounds with each yea=
r that passes," said Lindfield=2E "I have delivered the CEH course approxim=
ately 10 times a year for the last 4 years, and while I enjoy the addition =
of recent tools, it is difficult to make it through all of the slides, and =
make sense of the often poorly written labs=2E" http://mile2=2Ecom/articles=
/163-boson-difference-between-cpte-ceh=2Ehtml

"I know there is an on going debate about this vs CEH=0B=0BI have my CEH an=
d OSCP also=2E=2E=2E=0B=0BOSCP contains more debugging/exploit writing and =
technical=2E=2E=2EHowever the CPTE is much better then the CEH on content a=
nd delivery=2E" http://www=2Etechexams=2Enet/forums/security-certifications=
/58420-passed-cpte-mile2-formerly-cpts=2Ehtml

"CEH and CPTS courses are similar in concept (Theoretical basis) and from m=
y recent experience are very different in the way they delivered=2E I've fo=
und that CEH course was more theoretical with no time left for practical ex=
ercises and the instructor has no pen testing experience=2E CPTS course was=
 delivered by a very experienced instructor and I had a chance to play with=
 many tools and techniques=2E I felt a bit frustrated after completing CEH =
course due to the lack of practice and felt quite confident after finishing=
 CPTS course=2E  CEH Certification is pupular but I found that some people =
prefer not to put it on their CV=2E CPTS certification is not yet popular b=
ut doesn't have that stigma=2E I have CEH and getting ready for CPTS exam=
=2E"  http://www=2Eethicalhacker=2Enet/component/option,com_smf/Itemid,54/t=
opic,701=2Enew/


COURSE OVERVIEW

CPTEngineer's foundation is built firmly upon proven, hands-on,
Penetration Testing methodologies utilized by our international
group of vulnerability consultants=2E Mile 2 trainers keep abreast of
their field by practicing what they teach=2E They believe that, during
training, an equal emphasis should be placed on both theoretical
and real world experience if the student is going to succeed in
mastering the necessary skills to become a CPTEngineer=2E

The CPTEngineer presents information based on the
5 Key Elements of PenTesting: Information Gathering,
Scanning, Enumeration, Exploitation and Reporting=2E


System vulnerabilities will be discovered using these tried
and true steps alongside the use of the latest hacking
techniques=2E

This course also enhances the business skills needed by
today's students=2E It will enable them to identify protection
opportunities, justify testing activities, and optimize security
controls needed by businesses attempting to reduce risks=2E
mile2 goes far beyond simply teaching students to "Hack"=2E
Mere hacking was the norm for classes that were available
before mile2 has introduced a new methodology in teaching
this advanced skill=2E

Our course was developed around principles and behaviors used by malicious =
hackers=2E The course is taught with this in mind while keeping the focus o=
n professional penetration testing and ensuring the security of information=
 assets=2E

COURSE OUTLINE

Module 0: Course Overview
Module 1: Business and Technical Logistics of
     Pen Testing
Module 2: Financial Sector Regulations
Module 3: Information Gathering
Module 4: Detecting Live Systems
Module 5: Enumeration
Module 6: Vulnerability Assessments
Module 7: Malware, Trojans and Back Doors
Module 8: Windows Hacking
Module 9: Hacking UNIX/Linux
Module 10: Advanced Exploitation Techniques
Module 11: Pen Testing Wireless Networks
Module 12: Networks, Sniffing and IDS
Module 13: Injecting the Database
Module 14: Attacking Web Technologies
Module 15: Report Writing
Appendix 1: The Basics
Appendix 2: Linux Fundamentals
Appendix 3: Access Controls
Appendix 4: Protocols
Appendix 5: Cryptography
Appendix 6: Economics and Law

SPEAKER PROFILE

DENIZ KAYA
Multi-awarded IT Security and Networking Consultant
CPTE Master

Deniz Kaya's Summary
Cisco ASA and PIX Firewalls, IOS & Zone Based Firewall (ZBF), Cisco IPS App=
liances and AIP-SSM modules, Cisco Wireless LAN Controller Appliances and W=
iSMs, Cisco Wireless Control System WCS, Cisco Switches 6500 Sup720, 4500, =
3750, 3560, 2960 series, IBM AS400&iSeries, IPSEC VPN, EZVPN, DMVPN, SSLVPN=
, GETVPN, PKI enabled VPN, Ironport Email & Web, and Management appliances,=
 Penetration Testing, Network Security Review and Hardening, CiscoWorks, Ci=
sco Routers, EIGRP, OSPF, BGP, Cisco Unified Communication Manager, IP Tele=
phony, Radius, Tacacs, Proxy Servers, Microsoft Active Directory, Microsoft=
 NAP, Failover Clustering, MS Network Load Balancing, Business Continuity P=
lanning, Disaster Recovery=2E
Specialties
Certified Cisco Systems Instructor (CCSI), CCIE Security Written, CCNP, CCN=
P Security, CCSP, Cisco Ironport Certified Security Instructor & Profession=
al (CICSI & CICSP), Certified Penetration Testing Specialist/Engineer (CPTS=
/CPTE), Certified Ethical Hacker (CEH), Certified Disaster Recovery Enginee=
r (CDRE), Microsoft Certified Trainer (MCT) and Microsoft Certified System =
Engineer (MCSE)
To register, please call:

(63 2) 840=2E2612
(63 2) 893=2E8527

Look for Judy!

E-Mail:
judy@bitshieldsecurity=2Ecom
sales@bitshieldsecurity=2Ecom
www=2Ebitshieldsecurity=2Ecom

Duration:
5 days
Investment Fee:
P120, 000 + VAT (Regular Price - if payment is done after October 31, 2011)=

P88,000 + VAT (Early Bird - if payment is done on or before October 31, 201=
1)
Inclusion:
Original CPTE kit (mile2 workbooks (2), mile2 lab guide, key concepts/defin=
itions booklet,=A0 DVDs with penetration testing tools, white papers, video=
s & resources, mile2 pen, and mile2 T-shirt)
	Exam voucher
	AM/PM snacks & lunch
	Limited edition Bitshield/mile2 jacket (available only for the grand launc=
hing class)
Date:
November 21-25, 2011
Location:
St=2E Giles Hotel
Makati Avenue corner Kalayaan Avenue, Makati City, Philippines


Hurry, register now! Limited slots available!

This is a first-come first-served basis=2E  Your payment serves as the conf=
irmation of your seat=2E



Bitshield is the only Authorized Training Center of mile2 in the Philippine=
s=2E


We practice ethical email distribution=2E Please accept our sincere apologi=
es if you have received this e-mail in an unsolicited manner=2E If you don'=
t want to receive from us, kindly reply with the subject "Unsubscribe" to=
=A0sales@bitshieldsecurity=2Ecom






Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?tDcYxL0IjVs3G1xOIBx98rpy099fvOYYNcNdeWb5h49C>