Certified Penetration Testing Professional
EC-Council's Certified Penetration Testing Professional (C|PENT) teaches you how to perform an effective penetration testing in enterprise network environment that must be attacked, exploited, evaded and defended. If you have only been working in flat networks C|PENTS's live practice range will teach you to take your skills to the next level by teaching you how to pentest loT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.
Duration: 6 Months / 216 Hours
Career Path
- Ethical Hacker
- Penetration Tester
- Network Server Administrator
- Firewall Administrator
- Security Tester
- Cyberthreat Analyst
- Cloud Security Analyst
Course Plan
Fundamentals of penetration testing, including penetration testing approaches, strategies, methodologies, techniques, and various guidelines and recommendations for penetration testing.
Different stages and elements of scoping and engagement in penetration testing.
How to use techniques and tools to gather intelligence about the target from publicly available sources such as the World Wide Web (WWW), through website analysis, by using tools/frameworks/scripts, and so on.
Different social engineering techniques and perform social engineering penetration testing on a target organization.
How to implement a comprehensive penetration testing methodology for assessing networks from outsiders' perspectives. Learn the process attackers follow to exploit the assets using vulnerabilities from the outside of the network perimeter
Learn how to implement a comprehensive penetration testing methodology for assessing networks from insider's perspectives
Learn how to implement a comprehensive penetration testing methodology for assessing the security of network perimeter devices, such as Firewalls, IDS, Routers, and Switches.
How to analyse web applications for various vulnerabilities, including the Open Web Application Security Project (OWASP) Top 10, and determine the risk of exploitation.
Learn how to test various components of wireless networks, such as WLAN, RFID devices, and NFC technology devices.
Learn how to test various components of wireless networks, such as WLAN, RFID devices, and NFC technology devices.
Understand OT and SCADA concepts and learn the process of testing various components of OT and SCADA networks
Understand various security threats and concerns in cloud computing and learn how to perform cloud penetration testing to determine the probability of exploitation
Understand the binary analysis methodology and reverse engineer applications to identify vulnerable applications that may lead to the exploitation of an information system.
Learn how to document and analyse the results of a penetration test and recommend post-penetration test actions.