CPENT Penetration Testing Professional
COURSE OVERIVEW
EC-Council’s Certified Penetration Tester (CPENT) Training program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended.
If you have only been working in flat networks, CPENT’s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.
Join our CPENT Training Course to go beyond the concepts taught in CEH and learn the proven pen test methodologies used by the pros.
The heart of the CPENT Training Course is all about helping you master your pen testing skills by putting them to use on our live cyber ranges.
The CPENT Training Course is designed to be dynamic in order to give you a real-world training program, so just as targets and technology continue to change in live networks, both the CPENT practice and exam ranges will mimic this reality as our team of engineers continue to add targets and defenses throughout the CPENT course’s lifetime.
The CPENT Training Course is the next step after the Certified Ethical Hacker (CEH) certification on the journey to the Licensed Penetration Tester (LPT) Master.
CPENT Training Course Candidates will be:
- Ethical Hackers
- Penetration Testers
- Network server administrators
- Firewall Administrators
- Security Testers
- System Administrators and Risk Assessment professionals
Course Outline
- Module 01: Introduction to Penetration Testing
- Module 02: Penetration Testing Scoping and Engagement
- Module 03: Open-Source Intelligence (OSINT)
- Module 04: Social Engineering Penetration Testing
- Module 05: Network Penetration Testing – External
- Module 06: Network Penetration Testing– Internal
- Module 07: Network Penetration Testing – Perimeter Devices
- Module 08: Web Application Penetration Testing
- Module 09: Wireless Penetration Testing
- Module 10: IoT Penetration Testing
- Module 11: OT/SCADA Penetration Testing
- Module 12: Cloud Penetration Testing
- Module 13: Binary Analysis and Exploitation
- Module 14: Report Writing and Post Testing Actions
What Makes the Certified Penetration Testing Professional (CPENT) Unique?
- Advanced Windows Attacks
- Attacking IoT Systems
- Writing Exploits: Advanced Binary Exploitation
- Bypassing a Filtered Network
- Pentesting Operational Technology (OT)
- Access Hidden Networks with Pivoting
- Double Pivoting
- Privilege Escalation
- Evading Defense Mechanisms
- Attack Automation with Scripts
- Weaponize Your Exploits
- Write Professional Reports
Audience profile
CPENT Candidates will be:
- Ethical Hackers
- Penetration Testers
- Network server administrators
- Firewall Administrators
- Security Testers
- System Administrators and Risk Assessment professionals
PREREQUISITES
- The CPENT program is the next step after the Certified Ethical Hacker (CEH) certification on the journey to the Licensed Penetration Tester (LPT) Master