ACPM It Tanácsadó Kft.
Years of research indicate that the majority of Pen Testing candidates have gaps in their skills when it comes to multiple disciplines. The metrics also prove when the targets are not located on the same or a directly connected and reachable segment, very few can perform as well as they do when it is direct and on a flat network.
That’s why, for the first time in the industry, the assessment for the Certified Penetration Tester (CPENT) is about multiple disciplines and not just one or two specialty types.
The CPENT range, which is where our penetration testers gain real-world skills is designed to provide challenges across every level of the attack spectrum. Additinally the range contains multiple layers of network segmentation, and once access is gained in one segment, the latest pivoting techniques are required to reach the next segment.
Outside-the-box thinking – Customization of scripts and exploits – environment dynamically changes based on technology changes – Progressive segments
Penetration Testers, Ethical Hackers, Information Security Consultant, Security Testers/Analysts/Engineers, Network Server Administrators, Firewall Administrators, System Administrators, Risk Assessment Professionals
5 days
Minimum 40 hours
CPENT is a fully online, remotely proctored practical exam that challenges candidates through a grueling 24-hour performance-based, hands-on exam, categorized into two practical exams of 12-hours each, which will test your perseverance and fous by forcing you to outdo yourself with each new challenge. Candidates have the option to choose either two 12-hour exams or one 24-hour exam depending on how straining they would want the exam to be.
• 100% mapped with the NICE Framework
• 100% methodology based penetration testing program
• Blended with both manual and automated penetration testing approach
• Provides strong reporting writing guidance
• Gives a real-world experience through an Advanced Penetration Testing Range
• Offers standard templates that can help during a penetration test
► Introduction to Penetration Testing
► Penetration Testing Scoping and Engagement
► Open Source Intelligence (OSINT)
► Social Engineering Penetration Testing
► Network Penetraton Testing – External
► Network Penetraton Testing – Internal
► Network Penetraton Testing – Perimeter Devices
► Web Application Penetration Testing
► Wireless Penetration Testing
► IoT Penetration Testing
► OT/SCADA Penetration Testing
► Cloud Penetration Testing
► Binary Analysis and Exploitation
► Report writing and Post Testing Actions
► Appenix A: Penetration Testing Essential Concepts
► Appendix B: Fuzzing
► Appendix C: Mastering Metasploit Framework
► Appendix D: Powershell scripting
► Appendix E: Bash Environment and Scripting
► Appendix F: Python Environment and Scripting
► Appendix G: Perl Environment and Scripting
► Appendix H: Ruby Environment and Scripting
► Appendix I: Active Directory Pen Testing
► Appendix J: Databas Penetration Testing
► Appendix K: Mobile Device Penetraton Testing
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.