Alabama Computer Solutions Certification Training Boot Camp MCSE MCSD MCDBA Cisco CIW Linux Oracle Java Security Military Discounts Testimonials About Us Linux/Unix Certification MCSD Certification Home MCSE Certification MCDBA Certification Cisco Certification Security Certification Java Certification Oracle® Certification CIW Certification Jobs Boot Camp Financing Boot Camp Pricing Boot Camp Technical Schedule Contact Us


EC-Council Certified Penetration Tester (CPENT)

Course Length: 5 days
Certifications: EC-Council CPENT
Number of Exams: 1

Class Schedule
Call for Class Schedule

EC-Council's Certified Penetration Tester (CPENT) program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, CPENT's live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.

Course Objectives

During this course you will learn about these topics:

  • Attack IoT Systems
  • Writing Advanced Binary Exploits
  • Evade Defense Mechanisms & Weaponize Exploits
  • Pentest Operational Technology (OT)
  • Accessing through Pivoting & Double Pivoting
  • Advanced Windows Attack
  • Weaponize Your Exploits
  • Privilege Escalation
  • Attack Automation with Scripts
  • Write Professional Reports
  • Bypassing a Filtered Network
  • Evading Defense Mechanisms
  • Access Hidden Networks With Pivoting

Who Should Attend?

  • Ethical Hackers
  • Penetration Testers
  • Network server administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and Risk Assessment professionals

Course Prerequisites

We recommend that attendees of this course have taken the following courses or equivalent knowledge:

  • EC-Council Certified Ethical Hacker (CEH)
  • EC-Council Certified Network Defender (CND)

Course Outline

1 - Introduction to Penetration Testing
  • Penetration Testing Concepts
  • LPT Penetration Testing Methodology
  • Guidelines and Recommendations for Penetration Testing
2 - Penetration Testing Scoping and Engagement
  • Request for Proposal
  • Preparing Response Requirements for Proposal Submission
  • Setting the Rules of Engagement
  • Establishing Communication Lines
  • Timeline
  • Time/Location
  • Frequency of meetings
  • Time of Day
  • Identifying Personnel for Assistance
  • Handling Legal Issues in Penetration Testing Engagement
  • Preparing for the Test
  • Handling Scope Creeping During Pen Testing
3 - Open Source Intelligence (OSINT)
  • OSINT through the WWW
  • OSINT through Website Analysis
  • OSINT through DNS Interrogation
  • Automating the OSINT Process using Tools/Frameworks/Scripts
4 - Social Engineering Penetration Testing
  • Social Engineering Penetration Testing Concepts
  • Social Engineering Penetration Testing Using E-mail Attack Vector
  • Social Engineering Penetration Testing Using Telephone Attack Vector
  • Social Engineering Penetration Testing Using Physical Attack Vector
  • Reporting and Countermeasures/Recommendations
5 - Network Penetration Testing - External
  • Port Scanning
  • OS and Service Fingerprinting
  • Vulnerability Research
  • Exploit Verification
6 - Network Penetration Testing - Internal
  • Footprinting
  • Network Scanning
  • OS and Service Fingerprinting
  • Enumeration
  • Vulnerability Assessment
  • Windows Exploitation
  • Unix/Linux Exploitation
  • Other Internal Network Exploitation Techniques
  • Automating Internal Network Penetration Test Effort
  • Post Exploitation
  • Advanced Tips and Techniques
7 - Network Penetration Testing - Perimeter Devices
  • Assessing Firewall Security Implementation
  • Assessing IDS Security Implementation
  • Assessing Security of Routers
  • Assessing Security of Switches
8 - Web Application Penetration Testing
  • Discover Web Application Default Content
  • Discover Web Application Hidden Content
  • Conduct Web Vulnerability Scanning
  • Test for SQL Injection Vulnerabilities
  • Test for XSS Vulnerabilities
  • Test for Parameter Tampering
  • Test for Weak Cryptography Vulnerabilities
  • Tests for Security Misconfiguration Vulnerabilities
  • Test for Client-Side Attack
  • Tests for Broken Authentication and Authorization Vulnerabilities
  • Tests for Broken Session Management Vulnerabilities
  • Test for Web Services Security
  • Test for Business Logic Flaws
  • Test for Web Server Vulnerabilities
  • Test for Thick Clients Vulnerabilities
  • Wordpress Testing
9 - Wireless Penetration Testing
  • Wireless Local Area Network (WLAN) Penetration Testing
  • RFID Penetration Testing
  • NFC Penetration Testing
10 - IoT Penetration Testing
  • IoT Attacks and Threats
  • IoT Penetration Testing
11 - OT/SCADA Penetration Testing
  • OT/SCADA Concepts
  • Modbus
  • ICS and SCADA Pen Testing
12 - Cloud Penetration Testing
  • Cloud Penetration Testing
  • AWS Specific Penetration Testing
  • Azure Specific Penetration Testing
  • Google Cloud Platform Specific Penetration Testing
13 - Binary Analysis and Exploitation
  • Binary Coding Concepts
  • Binary Analysis Methodology
14 - Report Writing and Post Testing Actions
  • Penetration Testing Report: An Overview
  • Phases of Report Development
  • Report Components
  • Penetration Testing Report Analysis
  • Penetration Testing Report Delivery
  • Post-Testing Actions for Organizations

Alabama Computer Solutions is your best choice for EC-Council CPENT, EC-Council CPENT training, EC-Council CPENT certification, EC-Council CPENT certification boot camp, EC-Council CPENT boot camp, EC-Council CPENT certification training, EC-Council CPENT boot camp training, EC-Council CPENT boot camp certification, EC-Council CPENT certification course, EC-Council CPENT course, training EC-Council CPENT, certification EC-Council CPENT, boot camp EC-Council CPENT, certification EC-Council CPENT boot camp, certification EC-Council CPENT training, boot camp EC-Council CPENT training, certification EC-Council CPENT course.



home | technical schedule | application schedule | class outlines | mcse, mcdba, mcsd training | microsoft .net | cisco certification | security training | alabama training solutions oracle® certification training | linux, unix | comptia certification | web development | pricing | locations | financing | instructors needed | e-mail us





Search classes by keyword:


Search classes by category:

mcse training
MCSE boot camp MCSE Training MCSE Certification MCSE Bootcamp MCSE Boot Camp MCSE Course MCSE Training MCSE Certification MCSE Bootcamp MCSE Boot Camp MCSE MCSA Training MCSA Certification MCSA Bootcamp MCSA Boot Camp MCSA Course MCSA Training MCSA Certification MCSA Bootcamp MCSA Boot Camp MCSA Course MCSA MCSE 2003 MCSE Training 2003 MCSE Certification 2003 MCSE Boot Camp 2003 MCSE Course 2003 MCSE 2003 Training MCSE 2003 Certification MCSE 2003 Boot Camp MCSE 2003 Course Training MCSE 2003 Certification MCSE 2003 Boot Camp MCSE 2003 Course MCSE 2003 MCSE Training Course MCSE Training Boot Camp MCSE training
MCSE certification MCSE Training Certification
Training MCSE Certification Training MCSE Boot Camp Training MCSE Course MCSE Certification Training MCSE Certification Boot Camp MCSE Certification Course MCSE Boot Camp Training MCSE Boot Camp Course MCSE Course Training MCSE Course Certification MCSD MCSD Training MCSD Certification MCSD Course Certification Training Training Certification Microsoft Certification Certification Microsoft Microsoft Training

Copyright © 2024 Alabama Computer Solutions. Alabama Computer Solutions Refund Policy. All Rights Reserved.