CODE: ECC_CPENT
LENGTH: 40 Hours (5 days)
PRICE: €2.995,00
Why Join the C|PENT Course?
AI Skills, you learn from C|PENT Program:
AI empowers penetration testers by automating repetitive tasks, enhancing accuracy, and uncovering complex security flaws that traditional methods might overlook.
• Enhanced efficiency
• Improved accuracy
• Real-time threat detection
• Advanced vulnerability analysis
• Customization and scalability
Module 01: Introduction to Penetration Testing and Methodologies
• Learning Objectives
• Principles and Objectives of Penetration Testing
• Penetration Testing Methodologies and Frameworks
• Best Practices and Guidelines for Penetration Testing
• Role of Artificial Intelligence in Penetration Testing
• Role of Penetration Testing in Compliance with Laws, Acts, and Standards
• Module Summary
Module 02: Penetration Testing Scoping and Engagement
• Learning Objectives
• Penetration Testing: Pre-engagement Activities
• Key Elements Required to Respond to Penetration Testing RFPs
• Drafting Effective Rules of Engagement (ROE)
• Legal and Regulatory Considerations Critical to Penetration Testing
• Resources and Tools for Successful Penetration Testing
• Strategies to Effectively Manage Scope Creep
• Module Summary
Module 03: Open Source Intelligence (OSINT) and Attack Surface Mapping
• Learning Objectives
• Collecting Open-source Intelligence (OSINT) on Target's Domain Name
• Collecting OSINT about Target Organization on the Web
• Perform OSINT on Target’s Employees
• Open Source Intelligence (OSINT) using Automation Tools
• Attack Surface Mapping
• Module Summary
Module 04: Social Engineering Penetration Testing
• Learning Objectives
• Social Engineering Penetration Testing Concepts
• Off-Site Social Engineering Penetration Testing
• On-Site Social Engineering Penetration Testing
• Document Findings with Countermeasure Recommendations
• Module Summary
Module 05: Web Application Penetration Testing
• Learning Objectives
• Security Frame vs. Vulnerabilities vs. Attacks
• OWASP Penetration Testing Framework
• Web Application Footprinting and Enumeration Techniques
• Techniques for Web Vulnerability Scanning
• Test for Vulnerabilities in Application Deployment and Configuration
• Techniques to Assess Identity Management, Authentication, and Authorization Mechanisms
• Evaluate Session Management Security
• Evaluate Input Validation Mechanisms
• Detect and Exploit SQL Injection Vulnerabilities
• Techniques for Identifying and Testing Injection Vulnerabilities
• Exploit Improper Error Handling Vulnerabilities
• Identify Weak Cryptography Vulnerabilities
• Test for Business Logic Flaws in Web Applications
• Evaluate Applications for Client-Side Vulnerabilities
• Module Summary
Module 06: API and Java Web Token Penetration Testing
• Learning Objectives
• API and Java Web Tokens (JWT) Penetration Testing
• Techniques and Tools to Perform API Reconnaissance
• Test APIs for Authentication and Authorization Vulnerabilities
• Evaluate the security of JSON Web Tokens (JWT)
• Test APIs for Input Validation and Injection Vulnerabilities
• Test APIs for Security Misconfiguration Vulnerabilities
• Test APIs for Rate Limiting and Denial of Service (DoS) Attacks
• Test APIs for Security of GraphQL implementations
• Test APIs for Business Logic Flaws and Session Management
• Module Summary
Module 07: Perimeter Defense Evasion Techniques
• Learning Objectives
• Techniques to Evaluate Firewall Security Implementations
• Techniques to Evaluate IDS Security Implementations
• Techniques to Evaluate the Security of Routers
• Techniques to Evaluate the Security of Switches
• Module Summary
Module 08: Windows Exploitation and Privilege Escalation
• Learning Objectives
• Windows Pen Testing Methodology
• Techniques to Perform Reconnaissance on a Windows Target
• Techniques to Perform Vulnerability Assessment and Exploit Verification
• Methods to Gain Initial Access to Windows Systems
• Techniques to Perform Privilege Escalation
• Post-Exploitation Activities
• Module Summary
Module 09: Active Directory Penetration Testing
• Learning Objectives
• Architecture and Components of Active Directory
• Active Directory Reconnaissance
• Active Directory Enumeration
• Exploit Identified Active Directory Vulnerabilities
• Role of Artificial Intelligence in AD Penetration Testing Strategies
• Module Summary
Module 10: Linux Exploitation and Privilege Escalation
• Learning Objectives
• Linux Exploitation and Penetration Testing Methodologies
• Linux Reconnaissance and Vulnerability Scanning
• Techniques to Gain Initial Access to Linux Systems
• Linux Privilege Escalation Techniques
• Module Summary
Module 11: Reverse Engineering, Fuzzing and Binary Exploitation
• Learning Objectives
• Concepts and Methodology for Analyzing Linux Binaries
• Methodologies for Examining Windows Binaries
• Buffer Overflow Attacks and Exploitation Methods
• Concepts, Methodologies, and Tools for Application Fuzzing
• Module Summary
Module 12: Lateral Movement and Pivoting
• Learning Objectives
• Advanced Lateral Movement Techniques
• Advanced Pivoting and Tunneling Techniques to Maintain Access
• Module Summary
Module 13: IoT Penetration Testing
• Learning Objectives
• Fundamental Concepts of IoT Pen Testing
• Information Gathering and Attack Surface Mapping
• Analyze IoT Device Firmware
• In-depth Analysis of IoT Software
• Assess the Security of IoT Networks and Protocols
• Post-Exploitation Strategies and Persistence Techniques
• Comprehensive Pen Testing Reports
• Learning Objectives
Module 14: Report Writing and Post-Testing Actions
• Purpose and Structure of a Penetration Testing Report
• Essential Components of a Penetration Testing Report
• Phases of a Pen Test Report Writing
• Skills to Deliver a Penetration Testing Report Effectively
• Post-Testing Actions for Organizations
• Module Summary
Self-Study Modules
Exam Code : 312-39
Duration : 24 Hours or
Choose 2 Sessions of 12 Hours Each
Report Submission : Submit Pentesting Report within 7 Days of Examination
Test Format : 100% Practical Exam
Dual Certification : Score more than 90% and get one more certification: Licensed Penetration Tester