• Online, Instructor-Led
  • Online, Self-Paced
  • Classroom
Course Description

The Certified Penetration Testing Professional (C|PENT) course from NetCom Learning teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, CPENT?s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network. What's Included: Official Courseware, iLabs (Online Labs with 6 Months Access), Certification Exam Voucher

Learning Objectives

You will understand advanced Windows Attacks and access Hidden Networks with Pivoting. You will be able to locate Attacking IOT Systems. It will give you access hidden networks using double pivoting. You will understand latest methods of privilege escalation reverse engineering code to take control of execution then break out of the limited shell are required to gain root/admin. You will be able to testing by different defenses you are likely to see in the wild. You will be able to compromise and then extract the required data from the web apps to achieve points. You will be prepare for advanced penetration testing techniques and scripting. You will be able to build your armory with your coding expertise to hack the challenges.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Cyber Defense Infrastructure Support
  • Threat Analysis

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.