A rigorous Penetration Testing program that, unlike contemporary Penetration Testing courses, teaches you how to perform an effective Penetration test across filtered networks. C|PENT is a multidisciplinary course with extensive hands-on training in a wide range of crucial skills, including advanced Windows attacks, Internet of Things (IoT) and Operational Technology (OT) systems, filtered network bypass techniques, exploit writing, single and double pivoting, advanced privilege escalation, and binary exploitation. In summary, there is no program of its kind in the world!

hours

30

language

English

Summary

A rigorous Penetration Testing program that, unlike contemporary Penetration Testing courses, teaches you how to perform an effective Penetration test across filtered networks. C|PENT is a multidisciplinary course with extensive hands-on training in a wide range of crucial skills, including advanced Windows attacks, Internet of Things (IoT) and Operational Technology (OT) systems, filtered network bypass techniques, exploit writing, single and double pivoting, advanced privilege escalation, and binary exploitation. In summary, there is no program of its kind in the world!

Target Audience

Ethical Hackers

Penetration Testers

  • Network Server Administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and Risk Assessment Professionals
  • Cybersecurity Forensic Analyst
  • Cyberthreat Analyst
  • Cloud Security Analyst
  • Information Security Analyst
  • Application Security Analyst
  • Cybersecurity Assurance Engineer
  • Security Operations Center (SOC) Analyst
  • Technical Operations Network Engineer
  • Information Security Engineer
  • Network Security Penetration Tester
  • Network Security Engineer
  • Information Security Architect

prerequisites

Ethical Hacking

Skills Gained

  • ADVANCED WINDOWS ATTACKS
  • ATTACKING IOT SYSTEMS
  • WRITING EXPLOITS
  • ADVANCED BINARIES EXPLOITATION
  • BYPASSING A FILTERED NETWORK 
  • PENTESTING OPERATIONAL TECHNOLOGY (OT)
  • ACCESS HIDDEN NETWORKS WITH PIVOTING
  • PRIVILEGE ESCALATION
  • EVADING DEFENSE MECHANISMS 
  • ATTACK AUTOMATION WITH SCRIPTS
  • BUILD YOUR ARMORY: WEAPONIZE YOUR EXPLOITS
  • WRITE PROFESSIONAL REPORTS 

Topics Covered

minimize course outline