Certified Penetration Testing Professional (C|PENT)
November 7, 2023 2024-07-06 7:33Certified Penetration Testing Professional (C|PENT)
About This Course
Introduction to Certified Penetration Testing (C|PENT)
The Certified Penetration Testing Professional or C|PENT Certification, for short, re-writes the standards of penetration testing skill development.
EC-Council’s Certified Penetration Testing Professional (C|PENT) program teaches you how to perform an effective penetration testing in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, C|PENT’s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.
The heart of the C|PENT course is all about helping you master your pen testing skills by putting them to use on our live cyber ranges. The certified penetration testing ranges were designed to be dynamic in order to give you a real-world training program, so just as targets and technology continue to change in live networks, both the (C|PENT) practice and exam ranges will mimic this reality as our team of engineers continue to add targets and defenses throughout the C|PENT course’s lifetime.
Hiring Companies for Certified Penetration Testing (C|PENT)
Program Information
What Will You Learn ?
✓ Advanced Windows Attacks
Access active directories. Power your way through network defenses using PowerShell to execute Silver and Gold Ticket and Kerberoasting.
✓ Attacking IoT Systems
CPENT is the 1st certification in the world to teach IoT attacks
✓ Writing Exploits: Advanced Binary Exploitation
Go beyond advanced application security testing techniques and experience the thrill of exploiting vulnerabilities in flawed binaries across 32- and 64-bit code challenges.
✓ Bypassing a Filtered Network
Unlike flat networks that most certifications train in, access web applications and extract data through a series of filtered networks with CPENT.
✓ Pentesting Operational Technology (OT)
CPENT is the world’s first pen testing certification that allows you to intercept Modbus communication protocol and communicate between PLC and its slave nodes.
✓ Access Hidden Networks with Pivoting
Learn lateral movement and what it means to pivot through filtered networks.
✓ Double Pivoting
If you think pivoting is hard, wait until you try double pivoting!
✓ Privilege Escalation
Gain root access by mastering privilege escalation techniques.
✓ Evading Defense Mechanisms
We don’t just teach you to write exploits; we teach you to how to bypass protections.
✓ Attack Automation with Scripts
A key skill for most employers, we’ll teach you to go beyond tools!
✓ Weaponize Your Exploits
Pentesting tools not enough for you? Here’s your chance to learn to build your own armory.
✓ Write Professional Reports
Learn classic pen testing skills from experts.
- Ethical Hackers
- Penetration Testers
- Network Server Administrators
- Firewall Administrators
- Security Testers
- System Administrators and Risk Assessment Professionals
- Cybersecurity Forensic Analyst
- Cyberthreat Analyst
- Cloud Security
- Analyst Information Security Consultant
- Application Security Analyst
- Cybersecurity Assurance Engineer
- Security Operations Center (SOC) Analyst
- Technical Operations Network Engineer
- Information Security Engineer
- Network Security Penetration Tester
- Network Security Engineer
- Information Security Architect
CPENT is a fully online, remotely proctored practical exam that challenges you through a grueling 24-hour performance-based, hands-on exam. The exam is broken into two practical exams of 12-hours each that will test your perseverance and focus by forcing you to outdo yourself with each new challenge. You have the option to choose either two 12-hour exams or one 24-hour exam.
Candidates who score more than
70% will earn the CPENT certification. Candidates who score more than 90%
attain the prestigious LPT (Master) credential!
Exam features
- Choose your challenge! Either two 12-hour sessions or a single 24-hour exam!
- EC-Council specialists proctor the entire exam; cheating is not an option.
- Score at least 70% and become a CPENT.
- Score at least 90% and earn the highly regarded LPT (Master) designation!
Making an informed decision is difficult, and that’s where EC-Council’s C|PENT brochure comes to your rescue. The Certified Penetration Testing Professional (C|PENT) credential is the most trusted penetration testing certification that employers worldwide value, and for good reasons.
The comprehensive curriculum covers how to pen test IoT and OT systems, write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, customize scripts/exploits to get into the innermost segments of the network, and much more.
When you successfully achieve the C|PENT certification, you will be equipped with every skill you need to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended.
This is only an overview of C|PENT and what you will learn.
For complete information, download the brochure now.
Course Outline
Module 01: Introduction to Penetration Testing and Methodologies
Cover the fundamentals of penetration testing, including penetration testing approaches, strategies, methodologies, techniques, and various guidelines and recommendations for penetration testing.
Module 02: Penetration Testing Scoping and Engagement
Learn the different stages and elements of scoping and engagement in penetration testing.
Module 03: Open-Source Intelligence (OSINT)
Learn how to use techniques and tools to gather intelligence about the target from publicly available sources such as the World Wide Web (WWW), through website analysis, by using tools/frameworks/scripts, and so on.
Module 04: Social Engineering Penetration Testing
Learn different social engineering techniques and perform social-engineering penetration testing on a target organization.
Module 05: Network Penetration Testing – External
Learn how to implement a comprehensive penetration testing methodology for assessing networks from outsiders’ perspectives. Learn the process attackers follow to exploit the assets using vulnerabilities from the outside of the network perimeter.
Module 06: Network Penetration Testing – Internal
Learn how to implement a comprehensive penetration testing methodology for assessing networks from insider’s perspectives.
Module 07: Network Penetration Testing – Perimeter Devices
Learn how to implement a comprehensive penetration testing methodology for assessing the security of network perimeter devices, such as Firewalls, IDS, Routers, and Switches.
Module 08: Web Application Penetration Testing
Learn how to analyze web applications for various vulnerabilities, including the Open Web Application Security Project (OWASP) Top 10, and determine the risk of exploitation.
Module 09: Wireless Penetration Testing
Learn how to test various components of wireless networks, such as WLAN, RFID devices, and NFC technology devices.
Module 10: IoT Penetration Testing
Understand various threats to Internet of things (IoT) networks and learn how to audit security controls for various inherent IoT risks.
Module 11: OT and SCADA Penetration Testing
Understand OT and SCADA concepts and learn the process of testing various components of OT and SCADA networks
Module 12: Cloud Penetration Testing
Understand various security threats and concerns in cloud computing and learn how to perform cloud penetration testing to determine the probability of exploitation.
Module 13: Binary Analysis and Exploitation
Understand the binary analysis methodology and reverse engineer applications to identify vulnerable applications that may lead to the exploitation of an information system.
Module 14: Report Writing and Post Testing Actions
Learn how to document and analyze the results of a penetration test and recommend post-penetration test actions.
Additional Self-Study Modules
- Penetration Testing Essential Concepts
- Fuzzing
- Mastering Metasploit Framework
- PowerShell Scripting
- Bash Environment and Scripting
- Python Environment and Scripting
- Perl Environment and Scripting
- Ruby Environment and Scripting
- Active Directory Pen Testing
- Database Penetration Testing
- Mobile Device Penetration Testing
New Launch Discount
- Global Certification
- Placement Assistance
You are just one step away to give a new shape to your career.