EC-Council Certified Penetration Testing Professional (CPENT)

Total time
Location
At location
Starting date and place

EC-Council Certified Penetration Testing Professional (CPENT)

Fast Lane Institute for Knowledge Transfer GmbH
Logo Fast Lane Institute for Knowledge Transfer GmbH
Provider rating: starstarstarstarstar_half 9.0 Fast Lane Institute for Knowledge Transfer GmbH has an average rating of 9.0 (out of 34 reviews)

Need more information? Get more details on the site of the provider.

Starting dates and places
placeFrankfurt
12 Oct 2026 until 16 Oct 2026
placeHamburg
7 Dec 2026 until 11 Dec 2026
Description

Kursinhalt

  • Module 01: Introduction to Penetration Testing and Methodologies
  • Module 02: Penetration Testing Scoping and Engagement
  • Module 03: Open Source Intelligence (OSINT) and Attack Surface Mapping
  • Module 04: Social Engineering Penetration Testing
  • Module 05: Web Application Penetration Testing
  • Module 06: API and Java Web Token Penetration Testing
  • Module 07: Perimeter Defense Evasion Techniques
  • Module 08: Windows Exploitation and Privilege Escalation
  • Module 09: Active Directory Penetration Testing
  • Module 10: Linux Exploitation and Privilege Escalation
  • Module 11: Reverse Engineering, Fuzzing and Binary Exploitation
  • Module 12: Lateral Movement and Pivoting
  • Module 13: IoT Penetration Testin…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Kursinhalt

  • Module 01: Introduction to Penetration Testing and Methodologies
  • Module 02: Penetration Testing Scoping and Engagement
  • Module 03: Open Source Intelligence (OSINT) and Attack Surface Mapping
  • Module 04: Social Engineering Penetration Testing
  • Module 05: Web Application Penetration Testing
  • Module 06: API and Java Web Token Penetration Testing
  • Module 07: Perimeter Defense Evasion Techniques
  • Module 08: Windows Exploitation and Privilege Escalation
  • Module 09: Active Directory Penetration Testing
  • Module 10: Linux Exploitation and Privilege Escalation
  • Module 11: Reverse Engineering, Fuzzing and Binary Exploitation
  • Module 12: Lateral Movement and Pivoting
  • Module 13: IoT Penetration Testing
  • Module 14: Report Writing and Post Testing Actions

Voraussetzungen

Zwingend vorausgesetzt wird umfassendes Wissen über Penetrationstests in verschiedenen Disziplinen: Windows, IoT, Inline-Abwehr, Automatisierung, Betriebstechnologie und fortgeschrittenen Fähigkeiten in der binären Nutzung. Wer die Zertifizierung anstrebt muss darauf vorbereitet sein, dass nicht nur automatisierte Tools, sondern auch manuelle Fähigkeiten getestet werden.

Zielgruppe

Der Kurs richtet sich an diejenigen, die sich intensiv mit Angriffen und deren Abwehr auf das eigene Netzwerk befassen: Penetrationstester, Ethical Hacker, Berater für Informationssicherheit, Security-Tester und -Analytiker, Administratoren (Netzwerk, Firewall, System), Experten für Risikobewertung.

Detaillierter Kursinhalt

  • Module 01: Introduction to Penetration Testing
  • Module 02: Penetration Testing Scoping and Engagement
  • Module 03: Open Source Intelligence (OSINT)
  • Module 04: Social Engineering Penetration Testing
  • Module 05: Network Penetration Testing - External
  • Module 06: Network Penetration Testing - Internal
  • Module 07: Network Penetration Testing - Perimeter Devices
  • Module 08: Web Application Penetration Testing
  • Module 09: Wireless Penetration Testing
  • Module 10: IoT Penetration Testing
  • Module 11: OT/SCADA Penetration Testing
  • Module 12: Cloud Penetration Testing
  • Module 13: Binary Analysis and Exploitation
  • Module 14: Report Writing and Post Testing Actions
  • Appendix A: Penetration Testing Essential Concepts
  • Appendix B: Fuzzing
  • Appendix C: Mastering Metasploit Framework
  • Appendix D: PowerShell Scripting
  • Appendix E: Bash Environment and Scripting
  • Appendix F: Python Environment and Scripting
  • Appendix G: Perl Environment and Scripting
  • Appendix H: Ruby Environment and Scripting
  • Appendix I: Active Directory Pen Test
  • Appendix J: Database Penetration Testing
  • Appendix K: Mobile Device Penetration Testing
There are no reviews yet.
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.