The Penetration Vulnerabilities training course is the 2nd step in the CPTEngineer series which is based on 5 key elements of Pen Testing; information, gathering, scanning, enumeration, exploration and reporting. In this course expert Duane Anderson will help you understand the techniques necessary to effectively assess your system and network vulnerabilities. In this course you will learn the different tools used to assess system vulnerability and you will learn how and when to use them in the work place. This course is part two of five training series that will help prepare you to pass the CPTEngineer Certification Exam, formerly known as CPTS.
Your shopping cart is empty.
Improve your IT skills with self-paced, interactive, and engaging online training. Login from our state-of-the-art training center or from the comfort of your living room. Browse our catalog an register now!
Let our instructors’ software knowledge help you in the classroom and beyond. Our class sizes are small, allowing for full student participation and learning. Browse our catalog an register now!