CPENT - Certified Penetration Testing Professional

CPENT - Certified Penetration Testing Professional

Kestus:

40 academic hours

Toimumiskoht:

Veebikoolitus

EC-Council’s Certified Penetration Tester (CPENT) program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended.

 

Years of research indicate that the majority of Pen Testing candidates have gaps in their skills when it comes to multiple disciplines. The metrics also prove when the targets are not located on the same or a directly connected and reachable segment, very few can perform as well as they do when it is direct and on a flat network.

If you have only been working in flat networks, CPENT’s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.

Target audience:

  • Ethical Hackers
  • Penetration Testers
  • Network server administrators
  • Firewall Administrators
  • Security Testers
  • Security Engineers
  • System Administrators
  • Security Analysts  
  • Risk Assessment professionals
  • Information Security Consultants

As a result of the training participants will be able to:

  • Accomplish Advanced Window Attacks
  • Attack IoT Systems
  • Write Exploits: Advanced Binaries Exploitation
  • Bypass a Filtered Network
  • Pentest Operational Technology (OT)
  • Access Hidden Networks with Pivoting
  • Accomplish Double Pivoting
  • Perform Privilege Escalation
  • Evade Defense Mechanisms
  • Attack Automation with Scripts
  • Build Your Armory: Weaponize Your Exploits
  • Write Professional Reports

  

2 Certs, One Exam - CPENT & LPT Master

You have the potential to earn two certifications with one exam. If you score above 90% on the CPENT live range exam, not only will you earn the CPENT certification, but you will also earn the Licensed Penetration Tester (LPT) Master Credential!

 Exam features:

  • Choose your challenge! Either two 12-hour sessions or a single 24-hour exam!
  • EC-Council specialists proctor the entire exam; cheating is not an option.
  • Score at least 70% and become a CPENT.
  • Score at least 90% and earn the highly regarded LPT (Master) designation!

 

Prerequisites to the course (recommended):

Extensive knowledge of penetration testing across multiple disciplines extending from windows, IoTs, inline defenses to automation, operational technology, and advanced skills in binary exploitation. The certification tests the knowledge of the tester not only on automated tools but manual testing skills as well.

  • Advanced knowledge in Networking Protocols
  • Knowledge in Kali or ParrotOS and common Penetration Testing Tools
  • Knowledge in Exploiting Windows and Linux Hosts
  • Knowledge in Privilege Escalation in Linux and Windows
  • Knowledge in Wireless Penetration Testing
  • Knowledge in Web Application Penetration Testing

 

Training Principles:

The CPENT range consists of entire network segments that replicate an enterprise network — this is not a computer game simulation; this is an accurate representation of an enterprise network that will present the latest challenges to the pen tester. The benefit of hands-on learning in a live cyber range is that candidates will encounter multiple layers of network segmentation, and the CPENT course will teach candidates how to navigate these layers so that once access is gained in one segment, a candidate will know the latest pivoting techniques required to reach the next. However, that won’t be enough on its own as the targets and segments are progressive in nature, so once you get into one machine and or segment, the next one will challenge you even more.

The prerequisite for issuing the certificate is full participation in training.

Length: 40 academic hours

 

What Makes The Certified Penetration Testing Professional (CPENT) Unique?

Advanced Windows Attacks /  Attacking IOT Systems/ Writing Exploits: Advanced Binary Exploitation/ Bypassing a Filtered Network/ Pentesting Operational Technology (OT)/  Access Hidden Networks with Pivoting/ Double Pivoting/ Privilege Escalation/ Evading Defense Mechanisms/ Attack Automation with Scripts/ Weaponize Your Exploits/ Write Professional Reports/

 

The training topics and description:

CPENT certification consists of 14 modules and tests the abilities of a penetration tester in almost all the vectors of cybersecurity, some of which have been introduced for the first time in any penetration certification. 

 

Module 01: Introduction to Penetration Testing and Methodologies

Module 02: Penetration Testing Scoping and Engagement Methodology

Module 03: Open Source Intelligence (OSINT) Methodology

Module 04: Social Engineering Penetration Testing Methodology

Module 05: Network Penetration Testing Methodology –External

Module 06: Network Penetration Testing Methodology –Internal

Module 07: Network Penetration Testing Methodology -Perimeter Devices

Module 08: Web Application Penetration Testing Methodology

Module 09: Wireless Penetration Testing Methodology

Module 10: IoT Penetration Testing Methodology

Module 11: OT/SCADA Penetration Testing Methodology

Module 12: Cloud Penetration Testing Methodology

Module 13: Binary Analysis and Exploitation

Module 14: Report Writing and Post Testing Actions

 

Appendix A: Penetration Testing Essential Concepts

Appendix B: Fuzzing

Appendix C: Mastering Metasploit Framework

Appendix D: PowerShell Scripting

Appendix E: Bash Environment and Scripting

Appendix F: Python Environment and Scripting

Appendix G: Perl Environment and Scripting

Appendix H: Ruby Environment and Scripting

Appendix I: Active Directory Pen Testing

Appendix J: Database Penetration Testing Methodology

Appendix K: Mobile Device Penetration Testing Methodology

 

 

The training price also includes:

study materials;

a trainer's consultation on the topics learned by e-mail after the training;

exam voucher;

certificate. 

 

You can participate in the training with the Unemployment Insurance Fund training card.

See you at the training!

Koolitajad

  • Robert Petrunic

    Robert Petrunic was born in 1973 in Nagold, Germany, and has a Master’s degree in Computer Engineering.

    He works as a senior security consultant in Eduron IS, a company dedicated to IT security education, penetration testing, and computer forensics. He also works as a lecturer in the most successful Croatian private college “Algebra - University College", where he has designed several courses related to computer security and forensics.

    Robert is Microsoft certified trainer since 2002, EC-Council certified trainer from 2008 and VMware certified trainer since 2012. He works mainly in the security field since 2004, and Microsoft acknowledged this in 2008 assigning him Microsoft's most valuable professional recognition every year until 2017. For the last 15 years, Robert is working on programs related to ethical hacking and IT security awareness for system administrators, developers, and IT security consultant. He also speaks at regional IT conferences.

    Robert started to work in IT in 1996 and his learning curve was really steep from the beginning. Started as a computer technician, “cable guy” and a developer in one single person, which gave him an overview of the “big picture” early in the process. In early 2000 he decided to continue his career as a systems administrator and only a few years later security kicked in and “drag” Robert into this really difficult, but yet rewarding area. From 2008 he started to work mostly on security consulting and penetration testing, where he settled for a few years (2012-2014) in the best Croatian PT company Infigo. Today he is self-employed working as a trainer, security consultant, and penetration tester.

    Robert Petrunic

    Robert Petrunic was born in 1973 in Nagold, Germany, and has a Master’s degree in Computer Engineering.

    He works as a senior security consultant in Eduron IS, a company dedicated to IT security education, penetration testing, and computer forensics. He also works as a lecturer in the most successful Croatian private college “Algebra - University College", where he has designed several courses related to computer security and forensics.

    Robert is Microsoft certified trainer since 2002, EC-Council certified trainer from 2008 and VMware certified trainer since 2012. He works mainly in the security field since 2004, and Microsoft acknowledged this in 2008 assigning him Microsoft's most valuable professional recognition every year until 2017. For the last 15 years, Robert is working on programs related to ethical hacking and IT security awareness for system administrators, developers, and IT security consultant. He also speaks at regional IT conferences.

    Robert started to work in IT in 1996 and his learning curve was really steep from the beginning. Started as a computer technician, “cable guy” and a developer in one single person, which gave him an overview of the “big picture” early in the process. In early 2000 he decided to continue his career as a systems administrator and only a few years later security kicked in and “drag” Robert into this really difficult, but yet rewarding area. From 2008 he started to work mostly on security consulting and penetration testing, where he settled for a few years (2012-2014) in the best Croatian PT company Infigo. Today he is self-employed working as a trainer, security consultant, and penetration tester.

CPENT - Certified Penetration Testing Professional

Kestus:

40 academic hours

Toimumiskoht:

Veebikoolitus

EC-Council’s Certified Penetration Tester (CPENT) program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended.

 

Years of research indicate that the majority of Pen Testing candidates have gaps in their skills when it comes to multiple disciplines. The metrics also prove when the targets are not located on the same or a directly connected and reachable segment, very few can perform as well as they do when it is direct and on a flat network.

If you have only been working in flat networks, CPENT’s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.

Target audience:

  • Ethical Hackers
  • Penetration Testers
  • Network server administrators
  • Firewall Administrators
  • Security Testers
  • Security Engineers
  • System Administrators
  • Security Analysts  
  • Risk Assessment professionals
  • Information Security Consultants

As a result of the training participants will be able to:

  • Accomplish Advanced Window Attacks
  • Attack IoT Systems
  • Write Exploits: Advanced Binaries Exploitation
  • Bypass a Filtered Network
  • Pentest Operational Technology (OT)
  • Access Hidden Networks with Pivoting
  • Accomplish Double Pivoting
  • Perform Privilege Escalation
  • Evade Defense Mechanisms
  • Attack Automation with Scripts
  • Build Your Armory: Weaponize Your Exploits
  • Write Professional Reports

  

2 Certs, One Exam - CPENT & LPT Master

You have the potential to earn two certifications with one exam. If you score above 90% on the CPENT live range exam, not only will you earn the CPENT certification, but you will also earn the Licensed Penetration Tester (LPT) Master Credential!

 Exam features:

  • Choose your challenge! Either two 12-hour sessions or a single 24-hour exam!
  • EC-Council specialists proctor the entire exam; cheating is not an option.
  • Score at least 70% and become a CPENT.
  • Score at least 90% and earn the highly regarded LPT (Master) designation!

 

Prerequisites to the course (recommended):

Extensive knowledge of penetration testing across multiple disciplines extending from windows, IoTs, inline defenses to automation, operational technology, and advanced skills in binary exploitation. The certification tests the knowledge of the tester not only on automated tools but manual testing skills as well.

  • Advanced knowledge in Networking Protocols
  • Knowledge in Kali or ParrotOS and common Penetration Testing Tools
  • Knowledge in Exploiting Windows and Linux Hosts
  • Knowledge in Privilege Escalation in Linux and Windows
  • Knowledge in Wireless Penetration Testing
  • Knowledge in Web Application Penetration Testing

 

Training Principles:

The CPENT range consists of entire network segments that replicate an enterprise network — this is not a computer game simulation; this is an accurate representation of an enterprise network that will present the latest challenges to the pen tester. The benefit of hands-on learning in a live cyber range is that candidates will encounter multiple layers of network segmentation, and the CPENT course will teach candidates how to navigate these layers so that once access is gained in one segment, a candidate will know the latest pivoting techniques required to reach the next. However, that won’t be enough on its own as the targets and segments are progressive in nature, so once you get into one machine and or segment, the next one will challenge you even more.

The prerequisite for issuing the certificate is full participation in training.

Length: 40 academic hours

 

What Makes The Certified Penetration Testing Professional (CPENT) Unique?

Advanced Windows Attacks /  Attacking IOT Systems/ Writing Exploits: Advanced Binary Exploitation/ Bypassing a Filtered Network/ Pentesting Operational Technology (OT)/  Access Hidden Networks with Pivoting/ Double Pivoting/ Privilege Escalation/ Evading Defense Mechanisms/ Attack Automation with Scripts/ Weaponize Your Exploits/ Write Professional Reports/

 

The training topics and description:

CPENT certification consists of 14 modules and tests the abilities of a penetration tester in almost all the vectors of cybersecurity, some of which have been introduced for the first time in any penetration certification. 

 

Module 01: Introduction to Penetration Testing and Methodologies

Module 02: Penetration Testing Scoping and Engagement Methodology

Module 03: Open Source Intelligence (OSINT) Methodology

Module 04: Social Engineering Penetration Testing Methodology

Module 05: Network Penetration Testing Methodology –External

Module 06: Network Penetration Testing Methodology –Internal

Module 07: Network Penetration Testing Methodology -Perimeter Devices

Module 08: Web Application Penetration Testing Methodology

Module 09: Wireless Penetration Testing Methodology

Module 10: IoT Penetration Testing Methodology

Module 11: OT/SCADA Penetration Testing Methodology

Module 12: Cloud Penetration Testing Methodology

Module 13: Binary Analysis and Exploitation

Module 14: Report Writing and Post Testing Actions

 

Appendix A: Penetration Testing Essential Concepts

Appendix B: Fuzzing

Appendix C: Mastering Metasploit Framework

Appendix D: PowerShell Scripting

Appendix E: Bash Environment and Scripting

Appendix F: Python Environment and Scripting

Appendix G: Perl Environment and Scripting

Appendix H: Ruby Environment and Scripting

Appendix I: Active Directory Pen Testing

Appendix J: Database Penetration Testing Methodology

Appendix K: Mobile Device Penetration Testing Methodology

 

 

The training price also includes:

study materials;

a trainer's consultation on the topics learned by e-mail after the training;

exam voucher;

certificate. 

 

You can participate in the training with the Unemployment Insurance Fund training card.

See you at the training!

Koolitajad

  • Robert Petrunic

    Robert Petrunic was born in 1973 in Nagold, Germany, and has a Master’s degree in Computer Engineering.

    He works as a senior security consultant in Eduron IS, a company dedicated to IT security education, penetration testing, and computer forensics. He also works as a lecturer in the most successful Croatian private college “Algebra - University College", where he has designed several courses related to computer security and forensics.

    Robert is Microsoft certified trainer since 2002, EC-Council certified trainer from 2008 and VMware certified trainer since 2012. He works mainly in the security field since 2004, and Microsoft acknowledged this in 2008 assigning him Microsoft's most valuable professional recognition every year until 2017. For the last 15 years, Robert is working on programs related to ethical hacking and IT security awareness for system administrators, developers, and IT security consultant. He also speaks at regional IT conferences.

    Robert started to work in IT in 1996 and his learning curve was really steep from the beginning. Started as a computer technician, “cable guy” and a developer in one single person, which gave him an overview of the “big picture” early in the process. In early 2000 he decided to continue his career as a systems administrator and only a few years later security kicked in and “drag” Robert into this really difficult, but yet rewarding area. From 2008 he started to work mostly on security consulting and penetration testing, where he settled for a few years (2012-2014) in the best Croatian PT company Infigo. Today he is self-employed working as a trainer, security consultant, and penetration tester.

    Robert Petrunic

    Robert Petrunic was born in 1973 in Nagold, Germany, and has a Master’s degree in Computer Engineering.

    He works as a senior security consultant in Eduron IS, a company dedicated to IT security education, penetration testing, and computer forensics. He also works as a lecturer in the most successful Croatian private college “Algebra - University College", where he has designed several courses related to computer security and forensics.

    Robert is Microsoft certified trainer since 2002, EC-Council certified trainer from 2008 and VMware certified trainer since 2012. He works mainly in the security field since 2004, and Microsoft acknowledged this in 2008 assigning him Microsoft's most valuable professional recognition every year until 2017. For the last 15 years, Robert is working on programs related to ethical hacking and IT security awareness for system administrators, developers, and IT security consultant. He also speaks at regional IT conferences.

    Robert started to work in IT in 1996 and his learning curve was really steep from the beginning. Started as a computer technician, “cable guy” and a developer in one single person, which gave him an overview of the “big picture” early in the process. In early 2000 he decided to continue his career as a systems administrator and only a few years later security kicked in and “drag” Robert into this really difficult, but yet rewarding area. From 2008 he started to work mostly on security consulting and penetration testing, where he settled for a few years (2012-2014) in the best Croatian PT company Infigo. Today he is self-employed working as a trainer, security consultant, and penetration tester.

Lisainfo

Registreerudes e-poe, e-kirja või telefoni teel, saadame Teile arve ja täpsema info osalemise kohta.
Üksteist päeva enne koolitust saadame Teile e-kirjaga meenutuse osalemise infoga.

Koolitusel osalemine on nimeline, kuid saate osalejat tasuta muuta kuni koolituse alguseni.

Koolituse eest tasumine toimub arvel viidatud arveldusarvele. Arve saadetakse maksja aadressile e-postiga. Arve tuleb tasuda enne koolituse algust arvel märgitud maksetähtajaks.

IT Koolitus on Eesti Töötukassa koolituskaardi koostööpartner. Tutvuge koolituskaardi infoga SIIN.
Täpsema info saamiseks võtke meiega ühendust telefonil 618 1727 või [email protected].

Tühistamisinfo

Kui te ei saa mingil põhjusel koolitusel osaleda, palun andke sellest teada e-posti aadressil [email protected]. Kui teatate mitteosalemisest vähemalt 7 kalendripäeva ette, lepime Teiega kokku uue aja või tagastame 100% koolituse maksumusest. Tagastame koolituse osalustasu täismahus juhul, kui pole tehtud koolituse korraldamisega seotud kulutusi (ostetud õppematerjale jms). Koolitusele mitteilmumisel, sellest mitteteatamisel või koolituse poolelijätmisel õppetasu ei tagastata.

Asukoht ja kontaktid

Aadress

Veebikoolitus

IT Koolitus Vana-Lõuna 39/1, Tallinn 6181727 [email protected]

© AS Äripäev 2000-2024
  • Aadress: Vana Lõuna 39/1, 19094 Tallinn
  • Klienditugi: 667 0099 (8:15-17:00)
  • E-post: [email protected]