fbpx
E-learning hossza:
E-learning nyelve:
40 tanóra
Angol
E-learning díja:
429 500 Ft + Áfa

EC-Council’s Certified Penetration Testing Professional (CPENT) program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, CPENT’s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.

The CPENT program is the next step after the Certified Ethical Hacker (CEH) certification on the journey to the Licensed Penetration Tester (LPT) Master. There is a lot of chatter out in “the ether” that refers to CEH as a Pen Test program. That information is not correct. The CEH course was designed to teach the tools and methods deployed by cyber criminals.

The CPENT and its now-retired predecessor courses, the EC-Council Certified Security Analyst (ECSA) and the Advanced Penetration Tester (APT), are pen test courses that were designed to take the concepts taught in CEH and apply them to time-proven pen test methodologies.

English language skills required to complete the e-learning.

EC Council is sourcing E-Learning training and certification partners globally for the iLearn Division. iLearn is EC-Council’s Official Training program, where a learner learns through instructor-led self-paced video-based training methodology. Self-paced in that a certification candidate can set its own learning pace by pausing the lectures and returning to their studies as their schedule permits.

THE ADVANTAGE OF iLEARN IS THAT IT HAS:

  • Step by step guide from EC Council’s Master trainers who teach virtual lessons through HD video
  • Rich content equivalent to our classroom training
  • Access iLabs, the virtual simulated lab with more than 140 lab exercises and 2200 hacking tools inbuilt in the system
  • A convenient 365-days access our training content on the web
  • A cost-effective solution to training without additional time investment.

 

You have the potential to earn two certifications with one exam. If you score above a 90% on the CPENT live range exam, not only will you earn the CPENT certification, but you will also earn the Licensed Penetration Tester (LPT) Master Credential!

To be a LPT (Master) means that you can find chinks in the armor of defense-in-depth network security models with the help of network pivoting, making exploit codes work in your favor, or by writing Bash, Python, Perl, and Ruby scripts. The live range CPENT exam demands that you think on your feet, be creative in your approach, and not rely on the conventional techniques.

Outsmarting and out maneuvering the adversary is what sets you apart from the crowd. The CPENT’s hands-on exam offers a challenge like no other by simulating a complex network in real time. This experience will test your perseverance and focus by forcing you to outdo yourself with each new challenge.

LPT (Master) certified professional can:

  • Demonstrate a repeatable and measurable approach to penetration testing
  • Perform advanced techniques and attacks to identify SQL injection, Cross site scripting (XSS), LFI, RFI vulnerabilities in web applications
  • Submit a professional and industry accepted report that achieves management and technical buy-in
  • Get access to proprietary EC-Council penetration testing methodologies
  • Write exploit codes to gain access to a vulnerable system or application
  • Exploit vulnerabilities in Operating systems such as Windows, Linux
  • Perform privilege escalation to gain root access to a system
  • Demonstrate ‘Out-of-the-box’ and ‘lateral’ thinking
  • Ensure the integrity and value of the penetration testing certification, in a fully online, remotely proctored certification exam

CPENT...No other Pen Test Course like it!

 

Advanced Windows Attacks

This zone contains a complete forest that you first have to gain access to and then use PowerShell and any other means to execute Silver and Gold Ticket and Kerberoasting. The machines will be configured with defenses in place meaning you to have to use PowerShell bypass techniques and other advanced methods to score points within the zone.

Attacking IOT Systems

CPENT is the first certification that requires you to locate IOT devices and then gain access to the network. Once on the network, you must identify the firmware of the IOT device, extract it, and then reverse engineer it.

Writing Exploits: Advanced Binary Exploitation

Finding flawed code is a skill competent pen testers need. In this zone you will be required to find the flawed binaries then reverse engineer them to write exploits to take control of the program execution. The task is complicated by the requirement of penetrating from the perimeter to gain access then discover the binaries. Once that is done you have to reverse engineer the code. Unlike other certifications, CPENT includes 32 and 64 bit code challenges and some of the code will be compiled with basic protections of non-executable stacks. You must be able to write a driver program to exploit these binaries, then discover a method to escalate privileges. This will require advanced skills in binary exploitation to include the latest debugging concepts and egg hunting techniques. You are required to craft input code to first take control of program execution and second, map an area in memory to get your shell code to work and bypass system protections.

Bypassing a Filtered Network

The CPENT certification provides web zone challenges that exist within a segmentation architecture, so you have to identify the filtering of the architecture then leverage this knowledge to gain access to web applications. The next challenge is to compromise and then extract the required data from the web apps to achieve points.

Pentesting Operational Technology (OT)

The CPENT range contains a zone that is dedicated to ICS SCADA networks that the candidate will have to penetrate from the IT network side and gain access to the OT network. Once there, you will have to identify the Programmable Logic Controller (PLC) and then modify the data to impact the OT network. You must be able to intercept the Mod Bus Communication protocol and communication between the PLC and other nodes.

Access Hidden Networks with Pivoting

Based on our beta testing, pen testers struggle to identify the rules that are in place when they encounter a layered network. Therefore, in this zone you will have to identify the filtering rules then penetrate the direct network. From there, candidates have to attempt pivots into hidden networks using single pivoting methods, but through a filter. Most certifications do not have a true pivot across disparate networks and few (if any) have the requirement into and out of a filtering device.

Double Pivoting

Once you have braved and mastered the challenges of the pivot, the next challenge is the double pivot. This is not something that you can use a tool for; in most cases the pivot has to be set up manually. CPENT is the first certification in the world that requires you to access hidden networks using double pivoting.

Privilege Escalation

In this challenge, the latest methods of privilege escalation reverse engineering code to take control of execution then break out of the limited shell are required to gain root/admin.

Evading Defense Mechanisms

The range requires your exploits be tested by different defenses you are likely to see in the wild. Candidates are required to get their exploits past the defenses by weaponizing them.

Attack Automation with Scripts

Prepare for advanced penetration testing techniques and scripting with seven self-study appendices: Penetration testing with Ruby, Python, PowerShell, Perl, BASH, Fuzzing, and Metasploit.

Weaponize Your Exploits

Customize your own tools and build your armory with your coding expertise to hack the challenges presented to you as you would in real life.

Write Professional Reports

Experience how a pen tester can mitigate risks and validate the report presented to the client to really make an impact. Great pen testing doesn’t mean much to clients without a clearly written report!

 

 

 

Course Outline:

Module 01: Introduction to Penetration Testing

Module 02: Penetration Testing Scoping and Engagement

Module 03: Open Source Intelligence (OSINT)

Module 04: Social Engineering Penetration Testing

Module 05: Network Penetration Testing – External

Module 06: Network Penetration Testing– Internal

Module 07: Network Penetration Testing – Perimeter Devices

Module 08: Web Application Penetration Testing

Module 09: Wireless Penetration Testing

Module 10: IoT Penetration Testing

Module 11: OT/SCADA Penetration Testing

Module 12: Cloud Penetration Testing

Module 13: Binary Analysis and Exploitation

Module 14: Report Writing and Post Testing Actions

 

Additional Self-Study Modules:

  • Penetration Testing Essential Concepts
  • Fuzzing
  • Mastering Metasploit Framework
  • PowerShell Scripting
  • Bash Environment and Scripting
  • Python Environment and Scripting
  • Perl Environment and Scripting
  • Ruby Environment and Scripting
  • Active Directory Pen Testing
  • Database Penetration Testing
  • Mobile Device Penetration Testing

 

A Hands-On Exam Like No Other.

24 Hours will define your Pen Testing career

CPENT is a fully online, remotely proctored practical exam that challenges you through a grueling 24-hour performance-based, hands-on exam. The exam is broken into two practical exams of 12-hours each that will test your perseverance and focus by forcing you to outdo yourself with each new challenge. You have the option to choose either two 12-hour exams or one 24-hour exam.

Candidates who score more than 70% will earn the CPENT certification. Candidates who score more than 90% attain the prestigious LPT (Master) credential!

Exam features:

  • Choose your challenge! Either two 12-hour sessions or a single 24-hour exam!
  • EC-Council specialists proctor the entire exam; cheating is not an option.
  • Score at least 70% and become a CPENT.
  • Score at least 90% and earn the highly regarded LPT (Master) designation!

Kérdésed van az e-learninggel kapcsolatban?



ALAPOZÓ TRÉNINGEK EHHEZ A KÉPZÉSHEZ

Még nincs elegendő tudásod a kurzus elvégzéséhez? Akkor ezekkel a képzésekkel szerezheted meg a szükséges alapokat.


EC-Council Certified Ethical Hacker (CEH) E-learning and Exam
(MFCEHE)

Ár:
499 500 Ft + Áfa
CEH is the world’s most advanced certified ethical hacking course that covers 20 of the most current security domains any individual will ever want to know when they are planning to beef-up the information security posture of their organisation. This accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals. 

Ezek a tanfolyamok és e-learningek is érdekelhetnek

Tekintsd meg néhány további képzésünket a témában


EC-Council Certified Chief Information Security Officer (CCISO) E-learning and Exam
(MFCCISO)

Ár:
499 500 Ft + Áfa
The CCISO certification is an industry-leading program that recognises the real-world experience necessary to succeed at the highest executive levels of information security. Bringing together all the components required for C-Level positions, the CCISO program combines audit management, governance, IS controls, human capital management, strategic program development and the financial expertise vital for leading a highly successful IS program. The CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.
EC-Council Certified Secure Computer User v2 (CSCU) E-learning and Exam
(MFCSCU)

Ár:
79 500 Ft + Áfa
The CSCU training program aims at equipping students with the necessary knowledge and skills to protect their information assets. This course covers the fundamentals of various computer and network security threats, such as identity theft, credit card fraud, phishing, virus and backdoors, email hoaxes, loss of confidential information, hacking attacks and social engineering.
EC-Council Certified Network Defender (CND) E-learning and Exam
(MFCND)

Ár:
429 500 Ft + Áfa
The Certified Network Defender v3 (CND) credential is the most trusted network security certification that employers worldwide value and for good reasons. The comprehensive curriculum focuses on loT security, network virtualization practices for the remote workforce, enhanced cloud security, loT and operational technology (OT) modules, introduction to threat intelligence, in-depth attack surface analysis, and much more. 
EC-Council Computer Hacking Forensic Investigator (CHFI) E-learning and Exam
(MFCHFI)

Ár:
429 500 Ft + Áfa
CHFI v10 captures all the essentials of digital forensics analysis and evaluation required for the modern world — tested and approved by veterans and top practitioners of the cyber forensics industry. From identifying the footprints of a breach to collecting evidence for a prosecution, CHFI v10 handholds students through every step of the process with experiential learning. CHFI v10 is engineered by industry practitioners for professionals including those such as forensic analysts, cybercrime investigator, cyber defense forensic analyst, incident responders, information technology auditor, malware analyst, security consultant, chief security officers and aspirants alike.
EC-Council Disaster Recovery Professional (EDRP) E-learning and Exam
(MFEDRP)

Ár:
429 500 Ft + Áfa
The EDRP v3 course identifies vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an orginization. It also provides the networking professional with a foundation in disaster recovery course principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies and procedures, an understanding of the roles and relationships of various members of organisation, implementation of a plan and recovering from a disaster.
EC-Council Certified Incident Handler v2 (ECIH) E-learning and Exam
(MFECIH)

Ár:
229 500 Ft + Áfa
The ECIH program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. The comprehensive training program will make students proficient in handling as well as responding to various security incidents, such as network security incidents, malicious code incidents and insider attack threats.
EC-Council Certified SOC Analyst E-learning and Exam
(MFCSAE)

Ár:
279 500 Ft + Áfa
The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations. CSA is a training and credentialing program that helps the candidate acquire trending and in-demand technical skills through instruction by some of the most experienced trainers in the industry. The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team. Being an intense 3-day program, it thoroughly covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and collaborate with CSIRT at the time of need. 
EC-Council Certified Web Application Hacking and Security Tester (WAHS) E-learning and Exam
(MFWAHS)

Ár:
199 500 Ft + Áfa
Web Application Hacking and Security has challenges derived from the engaging iLab environments of EC Council – from Certified Ethical Hacker (CEH) to the Certified Penetration Testing Professional (CPENT); from Certified Application Security Engineer (CASE) .Net to Java. But Web Application Hacking and Security goes beyond this to more difficult scenarios as you advance through each problem. Web Application Hacking and Security is like a Capture-The-Flag (CTF) competitions meant to test your hacking skills. But you can keep on trying until you achieve the goal. Test your skills and work alone to solve complex problems or follow the instructor as they do a walkthrough to help you learn Web Application Hacking and Security. Watch your name rise on the leader board, a place where you’ll see who’s cracking the most challenges, who’s making the most progress, who’s cranking out the h@ck$!
EC-Council Ethical Hacking Core Skills E-learning and Exam
(MFEHCS)

Ár:
429 500 Ft + Áfa
In this course you will learn the core skills to build a solid security foundation. You will examine in detail the traffic that traverses the network at the packet and binary level. You will build solid knowledge on the lowest layers of the network. In the course, you will conduct extensive hands-on exercises. You will learn to master the TCP/IP protocol. You will learn essential UNIX and Linux survival skills that separate you from the many security professionals who are Windows centric.
Certified Information Systems Auditor (CISA) vizsgafelkészítő e-learning vizsga voucherrel
(MFCISAE)

Ár:
1 085 500 Ft + Áfa
This Certified Information Systems Auditor (CISA) Course provides delegates with in-depth knowledge about the Information Systems Audit process. During this training, they will learn about quality assurance, a systematic approach to determining if a product meets quality standards. They will also learn about disaster recovery plans that contain detailed instructions on responding to unplanned incidents.
Certified Information Security Manager (CISM) vizsgafelkészítő e-learning vizsga voucherrel
(MFCISME)

Ár:
1 085 500 Ft + Áfa
The Certified Information Security Manager (CISM) Training equips professionals with the skills and knowledge to safeguard valuable information assets. It is a highly relevant and crucial discipline in a technology-driven landscape. CISM, offered by ISACA, is a globally recognized certification that ensures individuals are well-versed in managing and governing an organization's information security.
Certified Cloud Security Professional (CCSP) vizsgafelkészítő e-learning vizsga voucherrel
(MFCCSPE)

Ár:
1 739 500 Ft + Áfa
This Certified Cloud Security Professional (CCSP) Certification Training Course is designed to empower delegates with the ability to understand the audit processes, methodologies, and adaptations required in a cloud environment. Delegates will gain insights into transitioning data, infrastructure, and applications from on-premises hardware to the cloud, ultimately boosting hybrid workforce productivity.
Certified Information Systems Security Professional (CISSP) vizsgafelkészítő e-learning
(MFCISSPE)

Ár:
1 739 500 Ft + Áfa
This Certified Information Systems Security Professional (CISSP) Training Course is designed to provide delegates with a rapid and comprehensive understanding of key CISSP concepts. Through interactive sessions, real-world case studies, and expert guidance, delegates will gain valuable insights into security policies, risk management, cryptography, and access control systems.