EC-Councilโs Certified Penetration Tester (CPENT) program is all about the pen test and will teach you to perform in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, CPENTโs live practice range will teach you to take your skills to the next level by teaching you to pen test IoT systems, OT systems, as well as how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and customization of scripts and exploits to get into the innermost segments of the network.
The CPENT range consists of entire network segments that replicate an enterprise network โ this is not a computer game simulation; this is an accurate representation of an enterprise network that will present the latest challenges to the pen tester. The benefit of hands on learning in a live cyber range is that candidates will encounter multiple layers of network segmentation, and the CPENT course will teach candidates how to navigate these layers, so that once access is gained in one segment, a candidate will know the latest pivoting techniques required to reach the next. However, that wonโt be enough on its own as the targets and segments are progressive in nature, so once you get into one machine and or segment, the next one will challenge you even more
CPENT is a fully online, remotely proctored practical exam that challenges candidates through a grueling 24-hour performance-based, hands-on exam. The exam is broken into 2 practical exams of 12-hours each that will test your perseverance and focus by forcing you to outdo yourself with each new challenge. Candidates have the option to choose either 2 12-hour exams or one 24-hour exam.
Candidates who score more than 70% will earn the CPENT certification. Candidates who score more than 90% attain the prestigious LPT (Master) credential!
Introduction to Penetration Testing and Methodolgies
Penetration Testing Scoping and Engagement
Open Source Intelligence (OSINT) and Attack Surface Mapping
Social Engineering Penetration Testing
Web Application Penetration Testing
API and Java Web Token Penetration Testing
Perimeter Defense Evasion Techniques
Windows Exploitation and Privilege Escalation
Active Directory Penetration Testing
Linux Exploitation and Privilege Escalation
Reverse Engineering, Fuzzing and Binary Exploitation
Lateral Movement and Pivoting
IoT Penetration Testing
Report Writing and Post Testing Actions
After completing this course you should have gained the following Advanced Pentesting skills:
Attendees should meet the following prerequisites:
NOK 42.000
COURSE CONTENT: Evolution of Hacking โข Operating System Services Security Overview โข Operating System Internal Security โข Databases Security โข Google Hacking โข HTTP Request Building โข Reconnaissance and…
COURSE CONTENT: Domain 1: Gorvenance, Risk and Compliance Governance โข Define, implement, manage and maintain an information security governance program that includes leadership, organizational structures, and processes. โข Align…
COURSE CONTENT: Types of Encryption Standards and their differencesHow to select the best standard for your organizationHow to enhance your pen-testing knowledge in encryptionCorrect and incorrect deployment of encryption…