Ec-council | Learning
CPENT programme by EC-Council | Approved penetration tester
Master advanced penetration tests with EC-Cuncil CPENT: attack, operate and defend complex networks, IoT and OT.
About Certified Penetration Testing Professional Course
Course outline
Course outline
- Module 01: Introduction to penetration tests
- Module 02: Definition of perimeter and engagement of penetration tests
- Module 03: Open Source Information (OSINT)
- Module 04: Social engineering penetration tests
- Module 05: Network penetration tests – External
- Module 06: Network penetration tests – Internal
- Module 07: Network penetration tests – Perimeter devices
- Module 08: Web application penetration tests
- Module 09: Wireless penetration tests
- Module 10: IoT penetration tests
- Module 11: OT/SCADA penetration tests
- Module 12: Cloud penetration tests
- Module 13: binary analysis and exploitation
- Module 14: Reporting and post-test actions
Description
The core of the programme CPENT helps students master their skills in penetration testing by putting them into practice on our live cyber environments. CPENT environments have been designed to be dynamic to provide students with a realistic training program. Thus, just as targets and technologies continue to evolve in online networks, the CPENT practice and examination environments will reflect this reality, as our engineering team continues to add targets and defences throughout the duration of the CPENT course.
Benefits of the CPENT course:
- 100 % according to the NICE framework.
- 100% penetration testing program based on a methodology.
- Combines manual and automated penetration test approaches.
- Designed with the most common penetration testing practices offered by the best service providers.
- Cartography with all the main job portals. Position Title: Penetration Tester and Security Analyst.
- Provides sound reporting advice.
- Provides practical experience through advanced penetration testing.
- Provides candidates with a standard penetration test to be used in the field.
Objectives of the course
Advanced attacks on Windows –
This area contains a complete forest to which you must first access, then use PowerShell and other means to run Silver and Gold tickets as well as Kerberoasting. The machines will be configured with defenses in place, which means you will need to use powershell bypass techniques and other advanced methods to score points in the area.
Attack on IoT systems +
CPENT is the first certification that requires locating IoT devices and then gaining network access. Once on the network, you must identify the firmware of the IoT device, extract it, and then perform reverse engineering.
Writing exploits: advanced binary exploitation +
Finding defective code is a necessary skill for competent penetration testers. In this area, you will have to find the defective binaries, then analyze them to write exploits allowing you to take control of the execution of the program. The task is complicated by the need to enter from the perimeter to access the network, then discover the binaries. Once this is done, you must proceed with reverse code engineering. Unlike other certifications, CPENT includes 32-bit and 64-bit code challenges, and some of the codes will be compiled with basic protections such as non-executable batteries. You must be able to write a pilot program to exploit these binaries, then discover a method to raise privileges. This will require advanced binary exploitation skills, including the latest debugging concepts and egg hunting techniques.
Contour a filtered network +
CPENT certification offers challenges in web areas that exist within a segmentation architecture. So you need to identify architecture filtering, then take advantage of this knowledge to access web applications. The next challenge is to compromise and then extract the data required from web applications to get points.
Operational Technology (OT) penetration tests +
The CPENT Beach contains an area dedicated to SCADA ICS networks that the candidate will need to enter from the IT side to access the Operational Network (OT). Once on site, you will need to identify the programmable logic controller (PLC) and then modify the data to impact the OT network. You must be able to intercept Modbus communication protocol as well as communications between PLC and other nodes.
Access hidden networks with swivelling +
According to our beta tests, penetration testers find it difficult to identify the rules in place when they encounter a layered network. Therefore, in this area, you will need to identify the filtering rules, then enter the direct network. From there, candidates will have to try pivots to hidden networks using simple pivot methods, but through a filter. Most certifications do not offer a real pivot between disparate networks, and few (or none) require entering and leaving a filtering device.
Double swivelling +
Once you have faced and mastered the challenges of pivot, the next challenge is the double pivot. This is not something you can use a tool for; in most cases, the pivot must be configured manually. The CPENT is the world's first certification that requires you to access hidden networks using double pivot.
Privilege climb +
In this challenge, the latest methods of climbing privileges by inverse code engineering to take control of the execution, then exit the limited shell, are necessary to get root/admin rights.
Escape of defence mechanisms +
The beach requires that your exploits be tested by different defenses that you are likely to encounter in the real world. Candidates must pass their exploits through the defenses by arming them.
Automation of attacks with scripts +
Prepare for advanced penetration testing techniques and script writing with seven self-learning appendices: penetration tests with Ruby, Python, PowerShell, Perl, BASH, Fuzzing and Metasploit.
Arming your exploits +
Personalize your own tools and build your arsenal with your programming expertise to meet the challenges presented to you, as you would in real life.
Writing professional reports +
Find out how a penetration tester can mitigate risks and validate the report presented to the client to have a real impact. An excellent penetration test does not have much value for customers without a clearly written report!
Review
The CPENT is a practical, fully online and remotely monitored exam that challenges candidates through a proven 24-hour, practice-based performance exam. The exam is divided into 2 practical 12-hour exams each that will test your perseverance and concentration by forcing you to surpass each new challenge. Candidates may choose either two 12-hour exams or a 24-hour exam.
Candidates who obtain more than 70% will pass CPENT certification. Those who get more than 90% will reach the prestigious LPT (Master) designation!
Characteristics of the examination:
- Choose your challenge! Either two 12-hour sessions or one 24-hour exam!
- EC-Council specialists oversee the entire review – Validity is not questioned.
- Get at least 70% and become CPENT.
- Get at least 90% and win the highly appreciated LPT (Master) designation!
You have the potential to win two certifications with one exam. If you get more than 90% on the CPENT live exam, not only will you receive CPENT certification, but you will also get the Licensed Penetration Tester (LPT) Master degree!
Being LPT (Master) means that you can find faults in the defense of deep network security models through network pivot, by making operating codes work for you, or by writing scripts in Bash, Python, Perl and Ruby. The CPENT live review requires you to think quickly, be creative in your approach, and not rely on conventional techniques.
Defying and bypassing the opponent is what distinguishes you from the crowd. The practical review of CPENT presents an unparalleled challenge by simulating a complex network in real time. This experience will test your perseverance and concentration by forcing you to surpass each new challenge.
A certified LPT (Master) professional may:
- Demonstrate a repeatable and measurable approach to penetration testing.
- Perform advanced techniques and attacks to identify vulnerabilities such as SQL injection, Cross-Site Scripting (XSS), LFI, RFI vulnerabilities in web applications.
- Submit a professional and industry-accepted report that obtains the support of management and technical aspects.
- Access EC-Cuncil's proprietary penetration testing methodologies.
- Write operating codes to access a vulnerable system or application.
- Exploit vulnerabilities in operating systems such as Windows, Linux.
- Climb privileges to get root access to a system.
- Demonstrate a thought « Off the beaten track » and « side ».
- Ensure integrity and value of penetration test certification, in a fully online and remotely monitored certification exam.
Roles
- Cybersecurity Forensic Analyst
- Level 2 Cyber Threat Analyst
- Cyber Threat Intelligence Analyst
- Information Security Analyst
- Cybersecurity engineer
- Applications Security Analyst II
- Cybersecurity insurance engineer
- Senior Insurance/Information Security Specialist
- Security Systems Analyst
- Security Operations Centre Analyst (SOC)
- Penetration tester
- Technical operations network engineer
- Information Security Officer
- Safety engineer
- Information Security Engineer
- Network Information Security Analyst
- Intermediate level penetration tester
- Computer Security Analyst III
- Junior Security Operations Centre Analyst (SOC)


