Live Classes: C)VA + C)PTE + C)PTC Boot Camp | Mile2® - Cyber Security Certifications
Shopping cart
There are no products in your cart.
Log in


C)VA + C)PTE + C)PTC Boot Camp

CPTE + CPTC Boot Camp
Class Format:
Class Dates

The "Ultimate" Penetration Testing & Ethical Hacking 6 Day Boot-Camp provides the latest and greatest penetration testing tools right in Mile2's customary Cyber Range. The first half of the camp focuses on Windows 7, Server 2003/2008 while the second half focuses on layer 2/3/4 boxes, which includes VPN’s, SSL, IDS, Firewalls and more!


Note: The C)PTE was updated by Randy Kohler and James Michael Stewart, author of 75+ books including the famous CISSP by Cybex. The C)PTC course was developed by Deniz Kaya, a Cisco security practitioner and instructor.

Delivered via: live on line, instructor led at the mile2 HQ, instructor led at a mile2 authorized training center, or instructor led at customer location (contact mile2 for details).

Group Discounts Available - Email Requests To:

Can't find a mile2 Authorized Training Center in your area? - Email:

 Check out the full C)PTE outline and C)PTC Outline and complete details for the "Ultimate" Penetration Testing & Ethical Hacking Boot-Camp.

A Certified Penetration Testing Consultant is a security professional with the ability to plan, manage and perform a penetration test. The designation “Consultant” is related to the depth and breadth of understanding required to manage a project involving multiple team members, manage the client’s expectations and deliver an audit of security controls that is thorough, well documented and ethically sound. 

  • Module 0: Course Overview
  • Module 1: Business and Technical Logistics of Pen Testing
  • Module 2: Linux Fundamentals
  • Module 3: Information Gathering
  • Module 4: Detecting Live Systems
  • Module 5: Enumeration
  • Module 6: Vulnerability Assessments
  • Module 7: Malware Goes Undercover
  • Module 8: Windows Hacking
  • Module 9: Hacking UNIX/Linux
  • Module 10: Advanced Exploitation Techniques
  • Module 11: Pen Testing Wireless Networks
  • Module 12: Networks, Sniffing and IDS
  • Module 13: Injecting the Database
  • Module 14: Attacking Web Technologies
  • Module 15: Project Documentation
  • Module 16:  CPTC Intro
  • Module 17:  Packet Capturing
  • Module 18:  Layer 2 Attacks
  • Module 19:  Layer 3 Attacks on Cisco Based Infrastructures
  • Module 20:  Pivoting and Relays
  • Module 21:  IPv6 Attacks
  • Module 22:  VPN Attacks
  • Module 23:  Defeating SSL
  • Module 24:  IDS/IPS Evasion
  •  Appendix 1: The Basics
  • Appendix 2: Financial Sector Regulations
  • Appendix 3: Access Controls
  • Appendix 4: Protocols
  • Appendix 5: Cryptography
  • Appendix 6: Economics and Law



Mile2 Ultimate