top of page
CPENT | Certified Penetration Testing Profesional

CPENT | Certified Penetration Testing Profesional

 

A rigorous Penetration Testing program that, unlike contemporary Penetration Testing courses, teaches you how to perform an effective Penetration test across filtered networks. C|PENT is a multidisciplinary course with extensive hands-on training in a wide range of crucial skills, including advanced Windows attacks, Internet of Things (IoT) and Operational Technology (OT) systems, filtered network bypass techniques, exploit writing, single and double pivoting, advanced privilege escalation, and binary exploitation. In summary, there is no program of its kind in the world!

 

Audience profile

  • Ethical Hackers
  • Penetration Testers
  • Network Server Administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and Risk Assessment Professionals
  • Cybersecurity Forensic Analyst
  • Cyberthreat Analyst
  • Cloud Security Analyst
  • Information Security Analyst
  • Application Security Analyst
  • Cybersecurity Assurance Engineer
  • Security Operations Center (SOC) Analyst
  • Technical Operations Network Engineer
  • Information Security Engineer
  • Network Security Penetration Tester
  • Network Security Engineer
  • Information Security Architect

 

Outline course

  • Module 1: Introduction to Penetration Testing and Methodologies

Cover the fundamentals of penetration testing, including penetration testing approaches, strategies, methodologies, techniques, and various guidelines and recommendations for penetration testing.

  • Module 2: Penetration Testing Scoping and Engagement

Learn the different stages and elements of scoping and engagement in penetration testing.

  • Module 3: Open-Source Intelligence (OSINT)

Learn how to use techniques and tools to gather intelligence about the target from publicly available sources such as the World Wide Web (WWW), through website analysis, by using tools/frameworks/scripts, and so on.

  • Module 4: Social Engineering Penetration Testing

Learn different social engineering techniques and perform socialengineering penetration testing on a target organization.

  • Module 5: Network Penetration Testing – External

Learn how to implement a comprehensive penetration testing methodology for assessing networks from outsiders’ perspectives. Learn the process attackers follow to exploit the assets using vulnerabilities from the outside of the network perimeter.

  • Module 6: Network Penetration Testing – Internal

Learn how to implement a comprehensive penetration testing methodology for assessing networks from insider’s perspectives.

  • Module 7: Network Penetration Testing - Perimeter Devices

Learn how to implement a comprehensive penetration testing methodology for assessing the security of network perimeter devices, such as Firewalls, IDS, Routers, and Switches.

  • Module 8: Web Application Penetration Testing

Learn how to analyze web applications for various vulnerabilities, including the Open Web Application Security Project (OWASP) Top 10, and determine the risk of exploitation.

  • Module 9: Wireless Penetration Testing

Learn how to test various components of wireless networks, such as WLAN, RFID devices, and NFC technology devices.

  • Module 10: IoT Penetration Testing

Understand various threats to Internet of things (IoT) networks and learn how to audit security controls for various inherent IoT risks.

  • Module 11: OT and SCADA Penetration Testing

Understand OT and SCADA concepts and learn the process of testing various components of OT and SCADA networks.

  • Module 12: Cloud Penetration Testing

Understand various security threats and concerns in cloud computing and learn how to perform cloud penetration testing to determine the probability of exploitation.

  • Module 13: Binary Analysis and Exploitation

Understand the binary analysis methodology and reverse engineer applications to identify vulnerable applications that may lead to the exploitation of an information system.

  • Module 14: Report Writing and Post Testing Actions

Learn how to document and analyze the results of a penetration test and recommend post penetration test actions.

 

Descargue el temario para conocer el detalle completo de los contenidos.

 

Debido a las constantes actualizaciones de los contenidos de los cursos por parte del fabricante, el contenido de este temario puede variar con respecto al publicado en el sitio oficial, sin embargo, Netec siempre entregará la versión actualizada de éste.

CPENT | Certified Penetration Testing Profesional

SKU: ECCOUNCIL-CPENT
bottom of page