CPENT Brochure
CPENT Brochure
CPENT Brochure
HACKING + MORE
Get More with C|PENT
CERTIFIED PENETRATION
TESTING PROFESSIONAL
Establish What is the C|PENT Course?
Certified
Penetration
Bridge the Gap
Testing
Professional
A rigorous Penetration Testing program that, unlike
contemporary Penetration Testing courses, teaches
Program
you how to perform an effective Penetration
test across filtered networks. C|PENT is a
multidisciplinary course with extensive hands-on
training in a wide range of crucial skills, including
advanced Windows attacks, Internet of Things (IoT)
and Operational Technology (OT) systems, filtered
network bypass techniques, exploit writing, single
and double pivoting, advanced privilege escalation,
and binary exploitation. In summary, there is no
program of its kind in the world!
C|PENT www.ecccouncil.org 02
That’s why for the first time in the industry, the assessment for the
Certified Penetration Testing Professional (C|PENT) is about multiple
disciplines and not just one or two specialty types.
1. T
he course is presented through an enterprise network environment that must be
attacked, exploited, evaded, and defended.
2. E
C-Council’s C|PENT assesses a Penetration Tester’s skills across a broad spectrum of
“network zones”.
3. W
hat makes the C|PENT different is the requirement to be provided a variety of different
scopes of work so that the candidate can “think on their feet.”
4. T
he result of this is that there are different zones representing different types of testing.
5. A
nyone attempting the test will have to perform their assessment against these different
zones.
C|PENT www.ecccouncil.org 03
With C|PENT, Learn the Next-Generation Techniques and
Methodologies for Handling Real-World Threat Situations
The following are 12 reasons that make the C|PENT Program one of a kind. This exceptional
course can make you one of the most advanced Penetration Testers in the world.
The course has one purpose: To help you overcome some of the most advanced obstacles
that real-world practitioners face when conducting Penetration tests.
Here are some examples of the challenges you will face when you are exposed to the C|PENT
Range:
The task is complicated and requires Penetration from the perimeter to gain access
then discover the binaries. Once successful, you must reverse engineer the code.
Unlike other certifications, this will not just be a simple 32-bit code. There will be
32- and 64-bit code challenges, and some of the code will be compiled with the
basic protections of non-executable stacks.
Furthermore, you must be able to write a driver program to exploit these binaries,
then discover a method to escalate privileges. This will require advanced skills in
binary exploitation that include the latest debugging concepts and egg hunting
techniques. You are required to craft input code first to take control of program
execution and second to map an area in memory to get your shellcode to work and
bypass system protections.
C|PENT www.ecccouncil.org 04
BYPASSING A FILTERED NETWORK
04 The C|PENT Certification differs from the others. It provides web zone challenges
that exist within a segmentation architecture. As a result, you have to identify the
filtering of the architecture, leverage it to gain access to the web applications that
you will have to compromise, and then extract the required data to achieve points.
DOUBLE PIVOTING
07 Once you have braved and mastered the challenges of the pivot, the next challenge
is the double pivot. This is not something that you can use a tool for. In most cases,
the pivot has to be set up manually. C|PENT is the first certification in the world
that requires you to access hidden networks using double pivoting.
PRIVILEGE ESCALATION
08 The latest methods of privilege escalation are covered as well as there will be
challenges that require you to reverse engineer code and take control of execution,
then break out of the limited shell and gain root/admin.
C|PENT www.ecccouncil.org 05
ATTACK AUTOMATION WITH SCRIPTS
10 Prepare for advanced Penetration Testing techniques/scripting with seven self-
study appendices – Penetration Testing with Ruby, Python, PowerShell, Perl, BASH,
and learn about Fuzzing and Metasploit.
C|PENT IS
RESULTS ORIENTED
> M
aps to the job role of a Penetration Tester and security analyst, based on major job
portals.
> Blended with both manual and automated Penetration Testing approach.
> esigned based on the most common Penetration Testing services offered by the best
D
service providers in the market.
> Offers standard templates that can help during a Penetration test.
C|PENT www.ecccouncil.org 06
PROGRAM OUTLINE
C|PENT www.ecccouncil.org 07
Web Application Penetration Testing
Module 08 Learn how to analyze web applications for various vulnerabilities,
including the Open Web Application Security Project (OWASP) Top 10,
and determine the risk of exploitation.
C|PENT www.ecccouncil.org 08
ADDITIONAL SELF-STUDY
MODULES
> Penetration Testing Essential Concepts > Perl Environment and Scripting
> Bash Environment and Scripting > Mobile Device Penetration Testing
SUGGESTED DURATION
5 DAYS
MINIMUM TRAINING EXAM
(9:00 AM – 5:00 PM)
OUTCOMES
> Mastery of Penetration Testing skills.
C P EN T
Certified Penetration Testing Professional
> Perform the repeatable methodology.
> Commitment to the code of ethics.
> Present analyzed results through structured reports.
OUTCOMES
> Mastery of ethical hacking skills.
> Useful in real-life cyber attack scenarios.
OUTCOMES
> A thorough introduction to ethical hacking.
> Exposure to threat vectors and countermeasures.
OUTCOMES
> Protect, detect, respond, and predict approach.
> Vendor-neutral certification with no tools/technologies restrictions.
> Learn general network security concepts, tools, and procedures.
Design, develop, and maintain secure networks.
C|PENT www.ecccouncil.org 09
COMMON JOB ROLES FOR C|PENT
Should you score at least 70% in the C|PENT practical exam, you shall attain the C|PENT
credential. However, if you are one of the few rare experts on the planet, you may be able to
hit the minimum 90% to earn the Licensed Penetration Tester (LPT) Master Credential!
C|PENT is a fully online, remotely proctored practical exam that evaluates candidates
through a challenging 24-hour performance-based, hands-on exam. The exam is broken into
two practical exams of 12 hours each that will test your perseverance and focus by forcing
you to outdo yourself with each new challenge. Candidates have the option to choose either
two 12-hour exams or one 24-hour exam.
Candidates who score more than 90% will establish themselves as Penetration Testing
Masters and attain the prestigious LPT (Master) credential!
C|PENT www.ecccouncil.org 10
Why People Love C|PENT
“The course content for C|PENT is amazing. C|PENT excels in teaching real-life scenarios,
which we face in practice.”
Amit Agarwal,
Research-oriented Technology Specialist
“The C|PENT labs are relevant to real-life situations you encounter as a penetration tester.”
Rasmus Christensen,
Systems Developer
“It offers a wide range of penetration testing domains, such as Active Directory penetration
testing, IoT, OT, Double Pivoting, etc.”
Harith Dilshan,
Senior Cybersecurity Engineer
C|PENT www.ecccouncil.org 11
About
EC-Council’s sole purpose is to build and refine the cybersecurity profession globally. We
help individuals, organizations, educators, and governments address global workforce
problems by developing and curating world-class cybersecurity education programs and their
corresponding certifications. We also provide cybersecurity services to some of the largest
businesses globally. Trusted by 7 of the Fortune 10, 47 of the Fortune 100, the Department
of Defence, Intelligence Community, NATO, and over 2,000 of the best Universities, Colleges,
and Training Companies, our programs have proliferated through over 140 countries. They
have set the bar in cybersecurity education. Best known for the Certified Ethical Hacker
programs, we are dedicated to equipping over 2,30,000 information age soldiers with the
knowledge, skills, and abilities required to fight and win against the black hat adversaries.
EC-Council builds individual and team/organization cyber capabilities through the Certified
Ethical Hacker Program, followed by a variety of other cyber programs, including Certified
Secure Computer User, Computer Hacking Forensic Investigator, Certified Security Analyst,
Certified Network Defender, Certified SOC Analyst, Certified Threat Intelligence Analyst,
Certified Incident Handler, as well as the Certified Chief Information Security Officer.
We are an ANSI 17024 accredited organization and have earned recognition by the DoD
under Directive 8140/8570 in the UK by the GCHQ, CREST, and various other authoritative
bodies that influence the entire profession.
Founded in 2001, EC-Council employs over 400 individuals worldwide with ten global offices
in the USA, UK, Malaysia, Singapore, India, and Indonesia. Its US offices are in Albuquerque,
NM, and Tampa, FL.
C|PENT www.ecccouncil.org 12
WE DON’T JUST TEACH
PENETRATION
TESTING
WE BUILD CYBER CAREERS
CERTIFIED PENETRATION TESTING PROFESSIONAL