Description
Duration: 5 days
About this Course
Our EC-Council Certified Penetration Testing Professional Certification Boot Camp is a comprehensive review of penetration testing in an enterprise network environment, combined with our award-winning CPENT exam preparation.
The CPENT is the next step after earning the Certified Ethical Hacker Certification. The CPENT is a pen test course that builds upon the knowledge of a CEH professional by further exploring the CEH modules and applying these subject areas to existing pen test methodologies.
The heart of the CPENT program is all about helping you master your pen testing skills by putting them to use on EC-Council live cyber ranges. The CPENT ranges were designed to be dynamic in order to give you a real-world training program, so just as targets and technology continue to change in live networks, both the CPENT practice and exam ranges will mimic this reality as the EC-Council team of engineers continue to add targets and defenses throughout the CPENT course’s lifetime.
- 100% mapped with the NICE framework.
- 100% methodology-based penetration testing program.
- Blends both manual and automated penetration testing approaches.
- Designed with the most common penetration testing practices offered by the best service providers.
- Maps to all major Job Portals. Role Title: Penetration Tester and Security Analyst.
- Provides strong reporting writing guidance.
- Gives a real-world experience through an Advanced Penetration Testing Range.
- Provides candidates with standard Pen test for use in the field.
What’s included?
- Authorized Courseware
- Intensive Hands on Skills Development with an Experienced Subject Matter Expert
- Hands on practice on real Servers and extended lab support 1.800.482.3172
- Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
- Academy Code of Honor: Test Pass Guarantee
- Optional: Package for Hotel Accommodations, Lunch and Transportation
Training Solutions
With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.
Methods
- Instructor-Led (the best training format we offer)
- Live Online Classroom – Online Instructor-Led
- Self-Paced Video
Speak to an Admissions Representative for complete details
Start | Finish | Public Price | Public Enroll | Private Price | Private Enroll |
---|---|---|---|---|---|
9/23/2024 | 9/27/2024 | ||||
10/14/2024 | 10/18/2024 | ||||
11/4/2024 | 11/8/2024 | ||||
11/25/2024 | 11/29/2024 | ||||
12/16/2024 | 12/20/2024 | ||||
1/6/2025 | 1/10/2025 | ||||
1/27/2025 | 1/31/2025 | ||||
2/17/2025 | 2/21/2025 | ||||
3/10/2025 | 3/14/2025 | ||||
3/31/2025 | 4/4/2025 | ||||
4/21/2025 | 4/25/2025 | ||||
5/12/2025 | 5/16/2025 | ||||
6/2/2025 | 6/6/2025 | ||||
6/23/2025 | 6/27/2025 | ||||
7/14/2025 | 7/18/2025 | ||||
8/4/2025 | 8/8/2025 | ||||
8/25/2025 | 8/29/2025 | ||||
9/15/2025 | 9/19/2025 | ||||
10/6/2025 | 10/10/2025 | ||||
10/27/2025 | 10/31/2025 | ||||
11/17/2025 | 11/21/2025 | ||||
12/8/2025 | 12/12/2025 | ||||
12/29/2025 | 1/2/2026 |
Course Outline
- Introduction to Penetration Testing
- Penetration Testing Scoping and Engagement
- Open Source Intelligence (OSINT)
- Social Engineering Penetration Testing
- Network Penetration Testing – External
- Network Penetration Testing– Internal
- Network Penetration Testing – Perimeter Devices
- Web Application Penetration Testing
- Wireless Penetration Testing
- IoT Penetration Testing
- OT/SCADA Penetration Testing
- Cloud Penetration Testing
- Binary Analysis and Exploitation
- Report Writing and Post Testing Actions