EC-Council: Certified Penetration Testing Professional
Learn how to effectively breach, exploit, and defend enterprise networks through hands-on penetration testing exercises in this intensive program.
- Training Duration:
- 5 Days
- Delivery:
- Online & Face to Face
-
Ethical Hackers
-
Penetration Testers
-
Network Server Administrators
-
Firewall Administrators
-
Security Testers
-
System Administrators and Risk Assessment Professionals
-
Cybersecurity Forensic Analyst
-
Cyberthreat Analyst
-
Cloud Security Analyst
-
Information Security Consultant
-
Application Security Analyst
-
Cybersecurity Assurance Engineer
-
Security Operations Center (SOC) Analyst
-
Technical Operations Network Engineer
-
Information Security Engineer
-
Network Security Penetration Tester
-
Network Security Engineer
-
Information Security Architect
- Advanced Windows Attacks: Master advanced techniques like Silver and Gold Ticket and Kerberoasting to bypass network defenses and access active directories using PowerShell.
- IoT Attack Vectors: Learn to exploit vulnerabilities in Internet of Things (IoT) devices, a specialized focus of the CIPENT certification.
- Binary Exploitation: Develop expertise in advanced binary exploitation techniques to write custom exploits for 32- and 64-bit binaries.
- Network Evasion: Overcome complex network filtering mechanisms to access web applications and extract data.
- Operational Technology (OT) Security: Gain proficiency in securing industrial control systems (ICS) by intercepting Modbus communication and interacting with PLC and slave nodes.
- Pivoting and Lateral Movement: Master techniques like pivoting and double pivoting to navigate networks and access hidden systems.
- Privilege Escalation: Learn to exploit vulnerabilities and elevate privileges to gain unauthorized access.
- Defense Evasion: Develop strategies to bypass security controls and avoid detection.
- Attack Automation: Utilize scripting to automate attacks and streamline your penetration testing process.
- Custom Tool Development: Build your own tools and techniques for targeted attacks.
- Penetration Testing Reporting: Create comprehensive and professional pen testing reports that effectively communicate your findings.
Core Modules:
- Introduction to Penetration Testing and Methodologies
- Penetration Testing Scoping and Engagement
- Open-Source Intelligence (OSINT)
- Social Engineering Penetration Testing
- Network Penetration Testing – External
- Network Penetration Testing – Internal
- Network Penetration Testing – Perimeter Devices
- Web Application Penetration Testing
- Wireless Penetration Testing
- IoT Penetration Testing
- OT and SCADA Penetration Testing
- Cloud Penetration Testing
- Binary Analysis and Exploitation
- Report Writing and Post-Testing Actions
Additional Self-Study Modules:
- Penetration Testing Essential Concepts
- Fuzzing
- Mastering Metasploit Framework
- PowerShell Scripting
- Bash Environment and Scripting
- Python Environment and Scripting
- Perl Environment and Scripting
- Ruby Environment and Scripting
- Active Directory Pen Testing
- Database Penetration Testing
- Mobile Device Penetration Testing
IT Professionals
Share this course to someone
Facebook
Twitter
LinkedIn
WhatsApp
Email
Print