Certified Penetration Testing Professional (CPENT) Course Outline
*** CLASS TIMES ***
Class times can be pre and post regular business hours. For this reason this course must be attended from your own location. Place your cursor on top of a class date to view class hours by time zone.
EC-Council’s Certified Penetration Tester program is all about the pen test and will teach you to perform in an enterprise network environment that must be attacked, exploited, evaded, and defended.
Students If you have only been working in flat networks, CPENT’s live practice range will teach you to take your skills to the next level by teaching you to pen test IoT systems, OT systems, as well as how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and customization of scripts and exploits to get into the innermost segments of the network.
The heart of the CPENT program is all about helping students master their pen test skills by putting them to use on our live cyber ranges. The CPENT ranges were designed to be dynamic in order to give students a real-world training program, so just as targets and technology continue to change in live networks, both the CPENT practice and exam ranges will mimic this reality as our team of engineers continues to add targets and defenses throughout the CPENT course’s lifetime.
What You Can Expect
Advanced Window Attacks
Attacking IoT Systems
Writing Exploits: Advanced Binaries Exploitation
Bypassing a Filtered Network
Pentesting Operational Technology (OT)
Access Hidden Networks with Pivoting
Evading Defense Mechanisms
Attack Automation with Scripts
Build Your Armory: Weaponize Your Exploits
Write Professional Reports
Module 01: Introduction to Penetration Testing
Module 02: Penetration Testing Scoping and Engagement
Module 03: Open Source Intelligence (OSINT)
Module 04: Social Engineering Penetration Testing
Module 05: Network Penetration Testing – External
Module 06: Network Penetration Testing – Internal
Module 07: Network Penetration Testing – Perimeter Devices
Module 08: Web Application Penetration Testing
Module 09: Wireless Penetration Testing
Module 10: IoT Penetration Testing
Module 11: OT/SCADA Penetration Testing
Module 12: Cloud Penetration Testing
Module 13: Binary Analysis and Exploitation
Module 14: Report Writing and Post Testing Actions
View outline in Word