CPENT - Certified Penetration Testing Professional

A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, the CPENT: Certified Penetration Testing Professional teaches you how to perform an effective penetration test across filtered networks.

The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies. In summary, there is no program of its kind in the world.

Duration: 5.0 days

Enquire Now

Start learning today!

Click Hereto customize your Training

Objectives

Advanced Windows Attacks

  • Access active directories. Power your way through network defenses using PowerShell to execute Silver and Gold Ticket and Kerberoasting.

Attacking loT Systems

  • CPENT is the 1st certification in the world to teach loT attacks

Writing Exploits: Advanced Binary Exploitation

  • Go beyond advanced application security testing techniques and experience the thrill of exploiting vulnerabilities in flawed binaries across 32- and 64-bit cot

Bypassing a Filtered Network

  • Unlike flat networks that most certifications train in, access web applications and extract data through a series of filtered networks with CENT.

Pentesting Operational Technology (OT)

  • CPENT is the world’s first pen testing certification that allows you to intercept Modbus communication protocol and communicate between PLC and its slave nodes.

Access Hidden Networks with Pivoting

  • Learn lateral movement and what it means to pivot through filtered networks.

Double Pivoting

  • If you think pivoting is hard, wait until you try double pivoting!

Privilege Escalation

  • Gain root access by mastering privilege escalation techniques

Evading Defense Mechanisms

  • We don’t just teach you to write exploits; we teach you to how to bypass protections

Attack Automation with Scripts

  • A key skill for most employers, we’ll teach you to go beyond tools!

Weaponize Your Exploits

  • Penetesting tools not enough for you? Here’s your chance to learn to build your own armory.

Write Professional Reports

  • Learn classic pen testing skills from experts.

Content

Module 1: Introduction to Penetration Testing

  • Cover the fundamentals of penetration testing, including penetration testing approaches, strategies, methodologies, techniques, and various guidelines and recommendations for penetration testing.

Module 2: Penetration Testing Scoping and Engagement

  • Learn the different stages and elements of scoping and engagement in penetration testing

Module 3: Open source Intelligence (OSINT)

  • Learn how to use techniques and tools to gather intelligence about the target from publicly available sources such as the World Wide Web (WWW), through website analysis by using tools/frameworks/scripts and so on

Module 4: Social Engineering Penetration Testing

  • Learn different social engineering techniques and perform social-engineering penetration testing on a target organization

Module 5: Network Penetration Testing - External

  • Learn how to implement a comprehensive penetration testing methodology for assessing networks from outsider’ perspectives. Learn the process attackers follow to exploit the assets using vulnerabilities from the outside of the network perimeter

Module 6: Network Penetration Testing - Internal

  • Learn how to implement a comprehensive penetration testing methodology for assessing networks from insider’s perspectives.

Module 7: Network Penetration Testing - Perimeter Devices

  • Learn how to implement a comprehensive penetration testing methodology for assessing the security of network perimeter devices, such as Firewalls, IDS, Routers and Switches

Module 8: Web Application Penetration Testing

  • Learn how to analyze we application for various vulnerabilities, including the Open Web Application Security (OWASP) Top 10, and determine the risk of exploitation

Module 9: Wireless Penetration Testing

  • Learn how to test various components of wireless networks, such as WLAN, RFID devices, and NFC technology devices

Module 10: IoT Penetration Testing

  • Understand various threats to Internet of things (IoT) networks and learn how to audit security controls for various inherent IoT risks

Module 11: OT/SCADA Penetration Testing

  • Understand OT and SCADA concepts and learn the process of testing various components of OT and SCADA networks

Module 12: Cloud Penetration Testing

  • Understand various security threats and concerns in cloud computing and learn how to perform cloud penetration testing to determine the probability of exploitation

Module 13: Binary Analysis and Exploitation

  • Understand the binary analysis methodology and reverse engineer applications to identify vulnerable applications that may lead to the exploitation of an information system

Module 14: Report Writing and Post Testing Actions

  • Learn how to document and analyze the results of a penetration test and recommend post-penetration test actions

Audience

  • Penetration Testers
  • Ethical Hackers
  • Information security Consultant
  • Security Testers
  • Security Analysts
  • Security Engineers
  • Network Server Administrators
  • Firewall Administrators
  • System Administrators
  • Risk Assesement Professionals

Prerequisites

There are no pre-requisites required to attend this course.

Certification

product-certification

Course Benefits

product-benefits
  • Career growth
  • Broad Career opportunities
  • Worldwide recognition from leaders
  • Up-to Date technical skills
  • Popular Certification Badges

EC-Council Popular Courses

cpent

EC-Council’s Certified Penetration Tester (CPENT) program teaches you how to perform an effective penetration test in an enterprise network environment that mus

ctia

Certified Threat Intelligence Analyst (C|TIA) is a training and credentialing program designed and developed in collaboration with cybersecurity and threat int

cnd

A CONTINUALLY ADAPTIVE COMPREHENSIVE SECURITY STRATEGY Cybersecurity is a non-linear process that required a continuous approach to mitigating cyber risks.
Enquire Now
 
 
 
 
ZydSy2
By clicking "Submit", I agree to the Terms Of Use and Privacy Policy