Years of research indicate that the majority of Penetration Testing professionals have gaps in their skills when it comes to multiple disciplines. The metrics also prove that when the targets are not located on the same or a directly connected and reachable segment, very few can perform as well as they do when it is direct and on a flat network.
That’s why for the first time in the industry, the assessment for the Certified Penetration Testing Professional (C|PENT) is about multiple disciplines and not just one or two specialty types.
- The course is presented through an enterprise network environment that must be attacked, exploited, evaded, and defended.
- EC-Council’s C|PENT assess a Penetration Tester’s skills across a broad spectrum of “network zones”.
- What makes the C|PENT different is the requirement to be provided a variety of different scopes of work so that the candidate can “think on their feet.”
- The result of this is that there are different zones representing different types of testing.
- Anyone attempting the test will have to perform their assessment against these different zones.
The C|PENT range, which is where our Penetration Testers gain real-world skills, is designed to provide challenges across every level of the attack spectrum. Additionally, the range contains multiple layers of network segmentation, and once access is gained in one segment, the latest pivoting techniques are required to reach the next segment. Many of the challenges will require outsidethe- box thinking and customization of scripts and exploits to get into the innermost segments of the network. The key to being a highly skilled Penetration Tester is to go up against various targets that are configured in a variety of ways. The C|PENT consists of entire network segments that replicate an enterprise network — this is not a computer game simulation; this is an accurate representation of an enterprise network that will present the latest challenges to the Penetration Tester. Since the targets and technology continue to change, the C|PENT is dynamic, and machines and defenses will be added as they are observed in the wild. Finally, the targets and segments are progressive in nature. Once you get into one machine and or segment, the next one will challenge you even more.
Module 01: Introduction to Penetration Testing
Module 02: Penetration Testing Scoping and Engagement
Module 03: Open Source Intelligence (OSINT)
Module 04: Social Engineering Penetration Testing
Module 05: Network Penetration Testing – External
Module 06: Network Penetration Testing – Internal
Module 07: Network Penetration Testing – Perimeter Devices
Module 08: Web Application Penetration Testing
Module 09: Wireless Penetration Testing
Module 10: IoT Penetration Testing
Module 11: OT/SCADA Penetration Testing
Module 12: Cloud Penetration Testing
Module 13: Binary Analysis and Exploitation
Module 14: Report Writing and Post Testing Actions
Additional Self-Study Modules
A: Penetration Testing Essential Concepts
C: Mastering Metasploit Framework
D: PowerShell Scripting
E: Bash Environment and Scripting
F: Python Environment and Scripting
G: Perl Environment and Scripting
H: Ruby Environment and Scripting
I: Active Directory Penetration Testing
J: Database Penetration Testing
K: Mobile Device Penetration Testing
Price per delegate
26 – 30 Jun 2023
18 – 22 Sep 2023
Please complete the contact form below or call 0141 221 5676 for further course information and available dates.
Alternatively you can email us at firstname.lastname@example.org