Certified Penetration Testing Professional (CPENT) Training Course


Certified Penetration Testing Professional - CPENT Certification Training Course Overview

This training program teaches participants on how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. For those who have only been working in flat networks, CPENT’s live practice range will teach participants to take their skills to the next level by teaching the methods of how to pen test a IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.

Audience

  • Ethical Hackers
  • Penetration Testers
  • Network server administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and Risk Assessment professionals
This course prepares you for Exam CPENT. Download Course Contents

Certified Penetration Testing Professional - CPENT Course schedule & Prices

Course Details Schedule
Live Virtual Classroom (Instructor-Led)
Duration : 5 Days (10 Days for 4 Hours/Day)
Fee : 1,300 (Includes Taxes) Includes Exam 
9 AM - 5 PM (Flexible Time Slots for 4 hours option)






Client's Location
As per mutual convenience
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request

Special Solutions for Corporate Clients! Click here

Hire Koenig Trainers Click here

Get Quote

Course Prerequisites

  • Advanced knowledge in Networking Protocols
  • Knowledge in Kali or ParrotOS and common Penetration Testing Tools
  • Knowledge in Exploiting Windows and Linux Hosts
  • Knowledge in Privilege Escalation in Linux and Windows
  • Knowledge in Wireless Penetration Testing
  • Knowledge in Web Application Penetration Testing

Upon completion of this course, you will be able to accomplish:

  • Advanced Window Attacks
  • Attacking IoT Systems
  • Writing Exploits: Advanced Binaries Exploitation
  • Bypassing a Filtered Network
  • Pentesting Operational Technology (OT)
  • Access Hidden Networks with Pivoting
  • Double Pivoting
  • Privilege Escalation
  • Evading Defense Mechanisms
  • Attack Automation with Scripts
  • Build Your Armory: Weaponize Your Exploits
  • Write Professional Reports