Certified Penetration Testing Professional AI (v2)
Why Join the C|PENT Course?
- Gain mastery in a complete hands-on pen testing methodology.
- Master AI pen testing skills mapped to all pen testing phases.
- Validate and test your skills across five unique multi-disciplinary courses, facing challenges at every level of the attack spectrum.
- Expand technical expertise in advanced penetration testing tools, techniques,
- methodologies, and AI tools.
- Become proficient in skills beyond the essential pen testing skills.
- Prioritize often-overlooked and critical aspects-scoping engagements, understanding design, estimating effort, and presenting findings.
- Develop the mindset of well-rounded, versatile professionals and lead red teams with offensive security skills.
- Engage in a hybrid learning model that combines guided learning and self-learning.
- Practice in diverse scenarios that mimic real-world enterprise environments with IoT systems, segmented networks, and advanced defenses.
- Participate in a highly tactical program with offensive security training.
- Gain deep practice through CTF challenges, the largest library of 100+ labs, and live cyber ranges.
- Follow and learn a rigorous, systematic approach that emulates a hacker's movement through configured target domains.
- Learn how to infiltrate organizations, evaluate risks, and write an actionable report.
- Show your prowess in a 100% practical exam, validating both your technical and nontechnical skills.
- Validate your elite offensive security skills on a global scale.
- Become VAPT-ready to handle real-world challenges and compliance requirements
AI Skills, you learn from C|PENT Program:
AI empowers penetration testers by automating repetitive tasks, enhancing accuracy, and uncovering complex security flaws that traditional methods might overlook.
• Enhanced efficiency
• Improved accuracy
• Real-time threat detection
• Advanced vulnerability analysis
• Customization and scalability
Paikka
Espoo Arrow Classroom (CET +1 / UTC +2)
Osallistumismuoto
Classroom
Remote
Kesto
5 päivää
Hinta
3595 €
Module 01: Introduction to Penetration Testing and Methodologies
• Learning Objectives
• Principles and Objectives of Penetration Testing
• Penetration Testing Methodologies and Frameworks
• Best Practices and Guidelines for Penetration Testing
• Role of Artificial Intelligence in Penetration Testing
• Role of Penetration Testing in Compliance with Laws, Acts, and Standards
• Module Summary
;
Module 02: Penetration Testing Scoping and Engagement
• Learning Objectives
• Penetration Testing: Pre-engagement Activities
• Key Elements Required to Respond to Penetration Testing RFPs
• Drafting Effective Rules of Engagement (ROE)
• Legal and Regulatory Considerations Critical to Penetration Testing
• Resources and Tools for Successful Penetration Testing
• Strategies to Effectively Manage Scope Creep
• Module Summary
;
Module 03: Open Source Intelligence (OSINT) and Attack Surface Mapping
• Learning Objectives
• Collecting Open-source Intelligence (OSINT) on Target's Domain Name
• Collecting OSINT about Target Organization on the Web
• Perform OSINT on Target's Employees
• Open Source Intelligence (OSINT) using Automation Tools
• Attack Surface Mapping
• Module Summary
;
Module 04: Social Engineering Penetration Testing
• Learning Objectives
• Social Engineering Penetration Testing Concepts
• Off-Site Social Engineering Penetration Testing
• On-Site Social Engineering Penetration Testing
• Document Findings with Countermeasure Recommendations
• Module Summary
;
Module 05: Web Application Penetration Testing
• Learning Objectives
• Security Frame vs. Vulnerabilities vs. Attacks
• OWASP Penetration Testing Framework
• Web Application Footprinting and Enumeration Techniques
• Techniques for Web Vulnerability Scanning
• Test for Vulnerabilities in Application Deployment and Configuration
• Techniques to Assess Identity Management, Authentication, and Authorization Mechanisms
• Evaluate Session Management Security
• Evaluate Input Validation Mechanisms
• Detect and Exploit SQL Injection Vulnerabilities
• Techniques for Identifying and Testing Injection Vulnerabilities
• Exploit Improper Error Handling Vulnerabilities
• Identify Weak Cryptography Vulnerabilities
• Test for Business Logic Flaws in Web Applications
• Evaluate Applications for Client-Side Vulnerabilities
• Module Summary
;
Module 06: API and Java Web Token Penetration Testing
• Learning Objectives
• API and Java Web Tokens (JWT) Penetration Testing
• Techniques and Tools to Perform API Reconnaissance
• Test APIs for Authentication and Authorization Vulnerabilities
• Evaluate the security of JSON Web Tokens (JWT)
• Test APIs for Input Validation and Injection Vulnerabilities
• Test APIs for Security Misconfiguration Vulnerabilities
• Test APIs for Rate Limiting and Denial of Service (DoS) Attacks
• Test APIs for Security of GraphQL implementations
• Test APIs for Business Logic Flaws and Session Management
• Module Summary
;
Module 07: Perimeter Defense Evasion Techniques
• Learning Objectives
• Techniques to Evaluate Firewall Security Implementations
• Techniques to Evaluate IDS Security Implementations
• Techniques to Evaluate the Security of Routers
• Techniques to Evaluate the Security of Switches
• Module Summary
;
Module 08: Windows Exploitation and Privilege Escalation
• Learning Objectives
• Windows Pen Testing Methodology
• Techniques to Perform Reconnaissance on a Windows Target
• Techniques to Perform Vulnerability Assessment and Exploit Verification
• Methods to Gain Initial Access to Windows Systems
• Techniques to Perform Privilege Escalation
• Post-Exploitation Activities
• Module Summary
;
Module 09: Active Directory Penetration Testing
• Learning Objectives
• Architecture and Components of Active Directory
• Active Directory Reconnaissance
• Active Directory Enumeration
• Exploit Identified Active Directory Vulnerabilities
• Role of Artificial Intelligence in AD Penetration Testing Strategies
• Module Summary
;
Module 10: Linux Exploitation and Privilege Escalation
• Learning Objectives
• Linux Exploitation and Penetration Testing Methodologies
• Linux Reconnaissance and Vulnerability Scanning
• Techniques to Gain Initial Access to Linux Systems
• Linux Privilege Escalation Techniques
• Module Summary
;
Module 11: Reverse Engineering, Fuzzing and Binary Exploitation
• Learning Objectives
• Concepts and Methodology for Analyzing Linux Binaries
• Methodologies for Examining Windows Binaries
• Buffer Overflow Attacks and Exploitation Methods
• Concepts, Methodologies, and Tools for Application Fuzzing
• Module Summary
;
Module 12: Lateral Movement and Pivoting
• Learning Objectives
• Advanced Lateral Movement Techniques
• Advanced Pivoting and Tunneling Techniques to Maintain Access
• Module Summary
;
Module 13: IoT Penetration Testing
• Learning Objectives
• Fundamental Concepts of IoT Pen Testing
• Information Gathering and Attack Surface Mapping
• Analyze IoT Device Firmware
• In-depth Analysis of IoT Software
• Assess the Security of IoT Networks and Protocols
• Post-Exploitation Strategies and Persistence Techniques
• Comprehensive Pen Testing Reports
• Learning Objectives
;
Module 14: Report Writing and Post-Testing Actions
• Purpose and Structure of a Penetration Testing Report
• Essential Components of a Penetration Testing Report
• Phases of a Pen Test Report Writing
• Skills to Deliver a Penetration Testing Report Effectively
• Post-Testing Actions for Organizations
• Module Summary
Self-Study Modules
- Penetration Testing Essential Concepts
- Mastering Metasploit Framework
- PowerShell Scripting
- Bash Environment and Scripting
- Python Environment and Scripting
- Perl Environment and Scripting
- Ruby Environment and Scripting
- Wireless Penetration Testing
- OT and SCADA Penetration Testing
- Cloud Penetration Testing
- Database Penetration Testing
- Mobile Device Penetration Testing
Hinta 3595 € +alv
Pidätämme oikeudet mahdollisiin muutoksiin ohjelmassa, kouluttajissa ja toteutusmuodossa.
Katso usein kysytyt kysymykset täältä.