EC-Council’s Certified Penetration Tester (CPENT) program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, CPENT’s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.
Blends both manual and automated penetration testing approaches.
Designed with the most common penetration testing practices offered by the best service providers.
Maps to all major Job Portals. Role Title: Penetration Tester and Security Analyst.
Provides strong reporting writing guidance.
Gives a real-world experience through an Advanced Penetration Testing Range.
Provides candidates with standard Pen test for use in the field.
CPENT… No other Pen Test Course like it!
Advanced Windows Attacks
This zone contains a complete forest that you first have to gain access to and then use PowerShell and any other means to execute Silver and Gold Ticket and Kerberoasting. The machines will be configured with defenses in place meaning you to have to use PowerShell bypass techniques and other advanced methods to score points within the zone.
Attacking IOT Systems
CPENT is the first certification that requires you to locate IOT devices and then gain access to the network. Once on the network, you must identify the firmware of the IOT device, extract it, and then reverse engineer it.
Writing Exploits: Advanced Binary Exploitation
Finding flawed code is a skill competent pen testers need. In this zone you will be required to find the flawed binaries then reverse engineer them to write exploits to take control of the program execution. The task is complicated by the requirement of penetrating from the perimeter to gain access then discover the binaries. Once that is done you have to reverse engineer the code. Unlike other certifications, CPENT includes 32 and 64 bit code challenges and some of the code will be compiled with basic protections of non-executable stacks. You must be able to write a driver program to exploit these binaries, then discover a method to escalate privileges. This will require advanced skills in binary exploitation to include the latest debugging concepts and egg hunting techniques. You are required to craft input code to first take control of program execution and second, map an area in memory to get your shell code to work and bypass system protections.
Bypassing a Filtered Network
The CPENT certification provides web zone challenges that exist within a segmentation architecture, so you have to identify the filtering of the architecture then leverage this knowledge to gain access to web applications. The next challenge is to compromise and then extract the required data from the web apps to achieve points.
Pentesting Operational Technology (OT)
The CPENT range contains a zone that is dedicated to ICS SCADA networks that the candidate will have to penetrate from the IT network side and gain access to the OT network. Once there, you will have to identify the Programmable Logic Controller (PLC) and then modify the data to impact the OT network. You must be able to intercept the Mod Bus Communication protocol and communication between the PLC and other nodes.
Access Hidden Networks with Pivoting
Based on our beta testing, pen testers struggle to identify the rules that are in place when they encounter a layered network. Therefore, in this zone you will have to identify the filtering rules then penetrate the direct network. From there, candidates have to attempt pivots into hidden networks using single pivoting methods, but through a filter. Most certifications do not have a true pivot across disparate networks and few (if any) have the requirement into and out of a filtering device.
Once you have braved and mastered the challenges of the pivot, the next challenge is the double pivot. This is not something that you can use a tool for; in most cases the pivot has to be set up manually. CPENT is the first certification in the world that requires you to access hidden networks using double pivoting.
In this challenge, the latest methods of privilege escalation reverse engineering code to take control of execution then break out of the limited shell are required to gain root/admin.
Evading Defense Mechanisms
The range requires your exploits be tested by different defenses you are likely to see in the wild. Candidates are required to get their exploits past the defenses by weaponizing them.
Attack Automation with Scripts
Prepare for advanced penetration testing techniques and scripting with seven self-study appendices: Penetration testing with Ruby, Python, PowerShell, Perl, BASH, Fuzzing, and Metasploit.
Weaponize Your Exploits
Customize your own tools and build your armory with your coding expertise to hack the challenges presented to you as you would in real life.
Write Professional Reports
Experience how a pen tester can mitigate risks and validate the report presented to the client to really make an impact. Great pen testing doesn’t mean much to clients without a clearly written report!
CPENT- Is this course for you?
CPENT Candidates will be:
Network server administrators
System Administrators and Risk Assessment professionals
CPENT Maps to the following Industry Job Roles:
Cyber Security Forensic Analyst
Cyber Threat Analyst Tier 2
Cyber Threat Intelligence Analyst
Information Security Analyst
Cyber Security Engineer
Application Security Analyst
Cyber Security Assurance Engineer
Senior Information Assurance/ Security Specialist
Security Systems Analyst
Security Operations Center (SOC) Analyst
Technical Operations Network Engineer
IT Security Administrator
Information Security Engineer
Network Security Information Analyst
Mid Level Penetration Tester
IT Security Analyst III
Junior Security Operations Center (SOC) Analyst
CPENT Course Outline
Module 01: Introduction to Penetration Testing
Module 02: Penetration Testing Scoping and Engagement
Module 14: Report Writing and Post Testing Actions
A Hands-On Exam Like No Other.
24 Hours will define your Pen Testing career
CPENT is a fully online, remotely proctored practical exam that challenges you through a grueling 24-hour performance-based, hands-on exam. The exam is broken into two practical exams of 12-hours each that will test your perseverance and focus by forcing you to outdo yourself with each new challenge. You have the option to choose either two 12-hour exams or one 24-hour exam.
Candidates who score more than 70% will earn the CPENT certification. Candidates who score more than 90% attain the prestigious LPT (Master) credential!
Choose your challenge! Either two 12-hour sessions or a single 24-hour exam!
EC-Council specialists proctor the entire exam; cheating is not an option.
Score at least 70% and become a CPENT.
Score at least 90% and earn the highly regarded LPT (Master) designation!
An Exciting Career Awaits A CPENT
Time of Completion
40-hour course + 24-hour exam
8,000+ on LinkedIn alone for Pen Testers
Spend just 40-hours and align your career to the growing demand for Penetration Testers. With CPENT, you will cover advanced penetration testing tools, techniques, and methodologies most needed right now.
Duration: 5 Days Date: December 13- 17, 2021 Time: 9.30 am. – 16.30 pm. Venue: ACinfotec Training Center
16th Fl., Asia Centre Bldg., South Sathorn Rd. Training Fees: Please Call Tel. 02 670 8980-3 ext.304 and 305 E-mail.[email protected]
Please read the following terms & conditions for course registration carefully. Upon clicking submit button, it is demonstrated that I/We understand and accept the registration and cancellation policies and procedures.
Full payment is required in advance prior to course commencement date.
Payment is due upon registration
Delegates who cancel after registration, or who don’t attend, are liable to pay the full course fee and no refunds can be given
A replacement is always welcome
Disclaimer: ACinfotec reserves the right to change, postpone or cancel. Any part of its published programme due to unforeseen circumstances.