Tags: EC-Council , Self-paced , Training
EC-Council Certified Penetration Testing Professional (CPENT) iLearn
- Brand: EC-Council
- Availability: In Stock
$2,199.00
This solution is an asynchronous, self-study environment in a video streaming format. A rigorous Penetration Testing program that, unlike contemporary Penetration Testing courses, teaches you how to perform an effective Penetration test across filtered networks. C|PENT is a multidisciplinary course with extensive hands-on training in a wide range of crucial...
This solution is an asynchronous, self-study environment in a video streaming format.
A rigorous Penetration Testing program that, unlike contemporary Penetration Testing courses, teaches you how to perform an effective Penetration test across filtered networks. C|PENT is a multidisciplinary course with extensive hands-on training in a wide range of crucial skills, including advanced Windows attacks, Internet of Things (IoT) and Operational Technology (OT) systems, filtered network bypass techniques, exploit writing, single and double pivoting, advanced privilege escalation, and binary exploitation. In summary, there is no program of its kind in the world.
Years of research indicate that the majority of Penetration Testing professionals have gaps in their skills when it comes to multiple disciplines. The metrics also prove that when the targets are not located on the same or a directly connected and reach able segment, very few can perform as well as they do when it is direct and on a flat network.
That’s why for the first time in the industry, the assessment for the Certified Penetration Testing Professional (C|PENT) is about multiple disciplines and not just one or two specialty types.
- The course is presented through an enterprise network environment that must be attacked, exploited, evaded, and defended.
- EC-Council’s C|PENT assesses a Penetration Tester’s skills across a broad spectrum of “network zones”.
- What makes the C|PENT different is the requirement to be provided a variety of different scopes of work so that the candidate can “think on their feet.”
- The result of this is that there are different zones representing different types of testing.
- Anyone attempting the test will have to perform their assessment against these different zones.
Target Audience
- Ethical Hackers
- Penetration Testers
- Network Server Administrators
- Firewall Administrators
- Security Testers
- System Administrators and Risk Assessment Professionals
- Cybersecurity Forensic Analyst
- Cyberthreat Analyst
- Cloud Security
- Analyst Information Security Consultant
- Application Security Analyst
- Cybersecurity Assurance Engineer
- Security Operations Center (SOC)Analyst
- Technical Operations Network Engineer
- Information Security Engineer
- Network Security Penetration Tester
- Network Security Engineer
- Information Security Architect
Course Outline
MODULE 01: Introduction to Penetration Testing
MODULE 02: Penetration Testing Scoping and Engagement
MODULE 03: Open Source Intelligence (OSINT)
MODULE 04: Social Engineering Penetration Testing
MODULE 05: Network Penetration Testing – External
MODULE 06: Network Penetration Testing – Internal
MODULE 07: Network Penetration Testing - Perimeter Devices
MODULE 08: Web Application Penetration Testing
MODULE 09: Wireless Penetration Testing
MODULE 10: IoT Penetration Testing
MODULE 11: OT/SCADA Penetration Testing
MODULE 12: Cloud Penetration Testing
MODULE 13: Binary Analysis and Exploitation
MODULE 14: Report Writing and Post Testing Actions
Additional Self-Study Modules
- Penetration Testing Essential Concepts
- Fuzzing
- Mastering Metasploit Framework
- PowerShell Scripting
- Bash Environment and Scripting
- Python Environment and Scripting
- Perl Environment and Scripting
- Ruby Environment and Scripting
- Active Directory Penetration Testing
- Database Penetration Testing
- Mobile Device Penetration Testing