EC-Council Certified Penetration Testing Professional (C|PENT)
Course Overview
Advance your cybersecurity skills with our EC-Council Certified Penetration Testing Professional (C|PENT) course. This intensive training program prepares you for the EC-Council Certified Penetration Testing Professional (C|PENT) official certification, providing you with the knowledge and techniques needed to perform advanced penetration testing.
The EC-Council's Certified Penetration Testing Professional (C|PENT) program is designed to elevate your penetration testing skills by immersing you in dynamic, real-world environments. This course covers advanced techniques for attacking and defending enterprise networks, including IoT and OT systems, exploit writing, and network pivoting.
Who is this course for?
- Ethical Hackers
- Penetration Testers
- Network Server Administrators
- Firewall Admins
- Security Testers
- System Admin and Risk Assessment Professionals
- Cybersecurity Forensic Analysts
- Cloud Security Analysts
- Information Security Consultants
- Application Security Analysts
- Cybersecurity Assurance Engineers
- Security Operations Center Analysts
- Technical Operations Network Engineers
- Information Security Engineers
- Network Security Penetration Testers
- Network Security Engineers
- Information Security Architects
What you need to know
Certified Penetration Testing Professional (C/PENT) program empowers you to conduct effective penetration testing in enterprise network environments. Whether you're experienced in flat networks or looking to advance your skills, C/PENT's live practice range elevates your capabilities. Learn to pen test IoT and OT systems, write exploits, develop tools, perform advanced binary exploitation, double pivot for hidden network access, and customize scripts to penetrate inner network segments. Gain practical expertise in attacking, exploiting, evading, and defending network security.
What You'll Learn
- Advanced Windows Attacks
- Attacking IoT Systems
- Writing Exploits
- Bypassing Filtered Networks
- Penetrating Operational Technology (OT)
- Access Hidden Networks with Pivoting
- Double Pivoting
- Privilege Escalation
- Evading Defense Mechanisms
- Attack Automation with Scripts
- Weaponize Your Exploits
- Write Professional Reports
Course Structure
This course will provide in-depth coverage of the following topics:
Module 1: Introduction to Penetration Testing and Methodologies
Module 2: Penetration Testing Scoping and Engagement
Module 3: Open-Source Intelligence
Module 4: Social Engineering Penetration Testing
Module 5: Network Penetration Testing - External
Module 6: Network Penetration Testing - Internal
Module 7: Network Penetration Testing - Perimeter Devices
Module 8: Web Application Penetration Testing
Module 9: Wireless Penetration Testing
Module 10: IoT Penetration Testing
Module 11: OT and SCADA Penetration Testing
Module 12: Cloud Penetration Testing
Module 13: Binary Analysis and Exploitation
Module 14: Report Writing and Post Testing Actions
Entry requirements
Prior experience in IT Security and Cloud is highly advantageous.
- Networking and Security Knowledge: Fundamental understanding of networking and cybersecurity concepts.
- Penetration Testing Experience: Prior experience in penetration testing or ethical hacking is recommended but not mandatory.
Pricing Options
Customised Pricing.
Get in touch to know more!
Prices mentioned includes GST. Pricing includes course training and exam voucher. Terms and Conditions Apply. Talk to an Upskilled Consultant to know more.
Upskilled Tech Academy
Industry Recognised Tech Training
Specialised technical courses are designed to equip your team with industry-relevant skills. Guided by top-tier trainers, our hands-on programs are meticulously crafted to align seamlessly with industry standards.