You can learn everything you need to know about attacking, exploiting, dodging, and defending enterprise networks in the Certified Penetration Testing Professional (C|PENT) course.

Course Price : $2999 Per Participant
Courses
Years of Experience
Global Learners
You can learn everything you need to know about attacking, exploiting, dodging, and defending enterprise networks in the Certified Penetration Testing Professional (C|PENT) course.
If you have only worked in flat networks up until now, CPENT’s live practice range will teach you how to take your skills to the next level by learning to pen-test IoT systems and OT systems, write your own exploits, and build your own tools, perform advanced binaries exploitation, double pivot into hidden networks, and modify scripts and exploits to get into the deepest parts of the network.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
For many years, Microtek Learning has been helping organizations, leaders, and professionals to reach their maximum performance by addressing the challenges they are facing.
Cover the fundamentals of penetration testing, including penetration testing approaches, strategies, methodologies, techniques, and various guidelines and recommendations for penetration testing.
Learn the different stages and elements of scoping and engagement in penetration testing.
Learn how to use techniques and tools to gather intelligence about the target from publicly available sources such as the World Wide Web (WWW), through website analysis, by using tools/frameworks/scripts, and so on.
Learn different social engineering techniques and perform socialengineering penetration testing on a target organization.
Learn how to implement a comprehensive penetration testing methodology for assessing networks from outsiders’ perspectives. Learn the process attackers follow to exploit the assets using vulnerabilities from the outside of the network perimeter.
Learn how to implement a comprehensive penetration testing methodology for assessing networks from insider’s perspectives.
Learn how to implement a comprehensive penetration testing methodology for assessing the security of network perimeter devices, such as Firewalls, IDS, Routers, and Switches.
Learn how to analyze web applications for various vulnerabilities, including the Open Web Application Security Project (OWASP) Top 10, and determine the risk of exploitation.
Learn how to test various components of wireless networks, such as WLAN, RFID devices, and NFC technology devices.
Understand various threats to Internet of things (IoT) networks and learn how to audit security controls for various inherent IoT risks.