Learn how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended using the EC-Council's Certified Penetration Tester (CPENT) program.
Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 7 or later.
- Mac: macOS 10.12 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online.
The EC-Council's Certified Penetration Tester (CPENT) program is an engaging, informative, and expertly designed course that aims to help you master your Penetration Testing (pen-testing) skills. Recognized by the American Council on Education (ACE), this penetrating testing course offers a comprehensive curriculum that encompasses innovative techniques and methodologies for tackling real-world threat scenarios.
In this penetration testing certification course, you will gain an understanding of a wide range of topics, such as how to write your own exploits, build custom tools, conduct advanced binaries exploitation, double pivot to access hidden networks and customize scripts/exploits to penetrate the most secure segments of a network. Pen testing is a practice that goes beyond ethical hacking by incorporating elements of exploitation, risk measurement, reporting, and executive communication.
Securing advanced domains such as the Internet of Things (IoT), Operational Technology (OT), and Cloud has become increasingly more difficult for cybersecurity professionals as there is a shortage of expertise in this area, and CPENT ranges are dynamic and constantly evolving to reflect live networks' changing targets and technology. Expert penetration testers must continually develop their skills in advanced tools, techniques, and methodologies to conduct effective penetration tests in enterprise network environments and protect against current and future cybersecurity threats.
Enrollment in this Pen Testing course includes a voucher that covers the cost of your certification exam upon course completion.
Note: We continually add new targets and defenses throughout the lifetime of this CPENT penetration testing course to ensure its relevance.
- Introduction to Penetration Testing
- Penetration Testing Scoping and Engagement
- Open-Source Intelligence (OSINT)
- Social Engineering Penetration Testing
- Network Penetration Testing – External
- Network Penetration Testing– Internal
- Network Penetration Testing – Perimeter Devices
- Web Application Penetration Testing
- Wireless Penetration Testing
- IoT Penetration Testing
- OT/SCADA Penetration Testing
- Cloud Penetration Testing
- Binary Analysis and Exploitation
- Active Directory Penetration Testing
- Report Writing and Post Testing Actions
What you will learn
- Advanced Windows Attacks
- Attacking IOT Systems
- Writing Exploits: Advanced Binary Exploitation
- Bypassing a Filtered Network
- Pen testing Operational Technology (OT)
- Access Hidden Networks with Pivoting
- Double Pivoting
- Privilege Escalation
- Evading Defense Mechanisms
- Attack Automation with Scripts
- Weaponize Your Exploits
- Write Professional Reports
How you will benefit
- Mapped with the NICE framework.
- 100% methodology-based penetration testing program
- Blends both manual and automated penetration testing approaches
- Designed with the best service providers' most common penetration testing practices
- Maps to all major Job Portals. Role Title: Penetration Tester and Security Analyst
- Provides strong reporting writing guidance
- Gives a real-world experience through an Advanced Penetration Testing Range
- Provides candidates with standard Pen test for use in the field
Kevin Cardwell
Kevin Cardwell is an experienced instructor, technical editor, and author for computer forensics and hacking courses. He has conducted over 500 security assessments across the globe with expertise in finding weaknesses and determining ways clients can mitigate or limit the impact of these weaknesses.
Kevin currently works as a freelance consultant and provides consulting services for companies throughout the world, and as an advisor to numerous government entities within the U.S., Middle East, Africa, Asia, and the U.K. He previously spent 22 years in the U.S. Navy and worked as both a software and systems engineer on a variety of Department of Defense projects.
Kevin is the author of the Center for Advanced Security and Training (CAST) Advanced Network Defense and Advanced Penetration Testing courses and Building Virtual Pentesting Labs for Advanced Penetration Testing, Advanced Penetration Testing for Highly Secured Environments 2nd Edition and Backtrack: Testing Wireless Network Security. He is technical editor of the Learning Tree Course Penetration Testing Techniques and Computer Forensics. He has also presented at the Blackhat USA, Hacker Halted, ISSA, and TakeDownCon conferences, and more.
Kevin received his Bachelor of Science in computer science from the National University in California and a Master of Science in software engineering from Southern Methodist University (SMU) in Texas. He holds the CEH, ECSA, LPT, and several other certifications.