AI COURCES BY AI CERTs™, NOW AVAILABLE AT CONESA NETWORKS • AI COURCES BY AI CERTs™, NOW AVAILABLE AT CONESA NETWORKS • AI COURCES BY AI CERTs™, NOW AVAILABLE AT CONESA NETWORKS •

ec-council

EC-Council: Certified Penetration Testing Professional

Learn how to effectively breach, exploit, and defend enterprise networks through hands-on penetration testing exercises in this intensive program.

  • Ethical Hackers

  • Penetration Testers

  • Network Server Administrators

  • Firewall Administrators

  • Security Testers

  • System Administrators and Risk Assessment Professionals

  • Cybersecurity Forensic Analyst

  • Cyberthreat Analyst

  • Cloud Security Analyst

  • Information Security Consultant

  • Application Security Analyst

  • Cybersecurity Assurance Engineer

  • Security Operations Center (SOC) Analyst

  • Technical Operations Network Engineer

  • Information Security Engineer

  • Network Security Penetration Tester

  • Network Security Engineer

  • Information Security Architect

  • Advanced Windows Attacks: Master advanced techniques like Silver and Gold Ticket and Kerberoasting to bypass network defenses and access active directories using PowerShell.
  • IoT Attack Vectors: Learn to exploit vulnerabilities in Internet of Things (IoT) devices, a specialized focus of the CIPENT certification.
  • Binary Exploitation: Develop expertise in advanced binary exploitation techniques to write custom exploits for 32- and 64-bit binaries.
  • Network Evasion: Overcome complex network filtering mechanisms to access web applications and extract data.
  • Operational Technology (OT) Security: Gain proficiency in securing industrial control systems (ICS) by intercepting Modbus communication and interacting with PLC and slave nodes.
  • Pivoting and Lateral Movement: Master techniques like pivoting and double pivoting to navigate networks and access hidden systems.
  • Privilege Escalation: Learn to exploit vulnerabilities and elevate privileges to gain unauthorized access.
  • Defense Evasion: Develop strategies to bypass security controls and avoid detection.
  • Attack Automation: Utilize scripting to automate attacks and streamline your penetration testing process.
  • Custom Tool Development: Build your own tools and techniques for targeted attacks.
  • Penetration Testing Reporting: Create comprehensive and professional pen testing reports that effectively communicate your findings.

Core Modules:

  • Introduction to Penetration Testing and Methodologies
  • Penetration Testing Scoping and Engagement
  • Open-Source Intelligence (OSINT)
  • Social Engineering Penetration Testing   
  • Network Penetration Testing – External
  • Network Penetration Testing – Internal
  • Network Penetration Testing – Perimeter Devices
  • Web Application Penetration Testing
  • Wireless Penetration Testing
  • IoT Penetration Testing   
  • OT and SCADA Penetration Testing
  • Cloud Penetration Testing
  • Binary Analysis and Exploitation
  • Report Writing and Post-Testing Actions   

Additional Self-Study Modules:

  • Penetration Testing Essential Concepts
  • Fuzzing
  • Mastering Metasploit Framework
  • PowerShell Scripting
  • Bash Environment and Scripting
  • Python Environment and Scripting
  • Perl Environment and Scripting
  • Ruby Environment and Scripting
  • Active Directory Pen Testing
  • Database Penetration Testing
  • Mobile Device Penetration Testing

IT Professionals

Share this course to someone
Facebook
Twitter
LinkedIn
WhatsApp
Email
Print