EC-Council Certified Penetration Testing Professional (CPENT) (SF) (Synchronous e-Learning)
About This Course
• Learn various fundamental concepts about penetration testing including its importance, types, process, phases, and methodologies.
• Learn how to initiate, engage, and proceed with a penetration testing assignment
• Learn various skills and techniques to gather intelligence about the target from various publicly available sources.
• Learn how to implement a comprehensive penetration testing methodology for assessing human behaviors that increases susceptibility to potential social engineering attacks.
• Learn how to implement a comprehensive penetration testing methodology for assessing network from outsider’s perspectives.
• Learn how to implement a comprehensive penetration testing methodology for assessing network from insider’s perspectives.
• Learn how to implement a comprehensive penetration testing methodology for assessing security of network perimeter devices, such as Firewalls, IDSes, Routers and Switches.
• Learn how to implement a comprehensive penetration testing methodology for assessing security of organization’s web applications and web servers.
• Learn how to implement a comprehensive penetration testing methodology for assessing security of organization’s wireless infrastructure.
• Learn how to establish a process for assessing IoT devices, extracting fi rmwarefrom devices, mount and run a fi rmware image and explore IoT exploitation.
• Learn about the challenges in industrial control systems (ICS), supervisory control and data acquisition (SCADA) testing, reviewing ICS/SCADA network protocols, analyze Modbus network traffic, and modifying ICS/SCADA network data.
• Learn how to implement a comprehensive penetration testing methodology for assessing security of organization’s cloud infrastructure.
• Learn about binary exploitation, buffer-overflow concepts, reviewing memory layout for stacks, analyze the memory and look for weaknesses, modifying the execution of a program, and bypass basic stack protections.
What You'll Learn
• Introduction to Penetration Testing and Methodologies
• Penetration Testing Scoping and Engagement
• Open Source Intelligence (OSINT)
• Social Engineering Penetration Testing
• Network Penetration Testing – External
• Network Penetration Testing – Internal
• Network Penetration Testing – Perimeter Devices
• Web Application Penetration Testing
• Wireless Penetration Testing
• IoT Penetration Testing
• OT and SCADA Penetration Testing
• Cloud Penetration Testing
• Binary Analysis and Exploitation
• Report Writing and Post Testing Actions
Entry Requirements
It is recommended that the participant to have at least 1 years of relevant working experience in IT industry with knowledge in the area of Ethical Hacking / network security.