Skip to main Content

EC-Council Certified Penetration Testing Professional (CPENT) + Voucher d'examen

  • Référence CPENT
  • Durée 5 jour(s)
  • Version 2.0

Classe inter à distance Prix

EUR3,890.00

hors TVA

Demander une formation en intra-entreprise S'inscrire

Modalité pédagogique

La formation est disponible dans les formats suivants:

  • Classe inter à distance

    Depuis n'importe quelle salle équipée d'une connexion internet, rejoignez la classe de formation délivrée en inter-entreprises.

  • Classe inter en présentiel

    Formation délivrée en inter-entreprises. Cette méthode d'apprentissage permet l'interactivité entre le formateur et les participants en classe.

  • Intra-entreprise

    Cette formation est délivrable en groupe privé, et adaptable selon les besoins de l’entreprise. Nous consulter.

Demander cette formation dans un format différent

EC-Council’s Certified Penetration Tester (CPENT) program is all about the pen test and will teach you to perform in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, CPENT’s live practice range will teach you to take your skills to the next level by teaching you to pen test IoT systems, OT systems, as well as how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and customization of scripts and exploits to get into the innermost segments of the network.

The CPENT range consists of entire network segments that replicate an enterprise network — this is not a computer game simulation; this is an accurate representation of an enterprise network that will present the latest challenges to the pen tester. The benefit of hands on learning in a live cyber range is that candidates will encounter multiple layers of network segmentation, and the CPENT course will teach candidates how to navigate these layers, so that once access is gained in one segment, a candidate will know the latest pivoting techniques required to reach the next. However, that won’t be enough on its own as the targets and segments are progressive in nature, so once you get into one machine and or segment, the next one will challenge you even more

CPENT is a fully online, remotely proctored practical exam that challenges candidates through a grueling 24-hour performance-based, hands-on exam. The exam is broken into 2 practical exams of 12-hours each that will test your perseverance and focus by forcing you to outdo yourself with each new challenge. Candidates have the option to choose either 2 12-hour exams or one 24-hour exam.

Candidates who score more than 70% will earn the CPENT certification. Candidates who score more than 90% attain the prestigious LPT (Master) credential!

Prochaines dates

Haut de page
    • Modalité: Classe inter à distance
    • Date: 10-14 novembre, 2025 | 9:00 AM to 5:00 PM
    • Centre: SITE DISTANT (W. Europe )
    • Langue: Anglais

    EUR3,890.00

    • Modalité: Classe inter à distance
    • Date: 12-16 janvier, 2026 | 10:00 AM to 6:00 PM
    • Centre: SITE DISTANT (W. Europe )
    • Langue: Anglais

    EUR3,890.00

    • Modalité: Classe inter à distance
    • Date: 16-20 mars, 2026 | 9:00 AM to 5:00 PM
    • Centre: SITE DISTANT (W. Europe )
    • Langue: Anglais

    EUR3,890.00

    • Modalité: Classe inter à distance
    • Date: 13-17 avril, 2026 | 9:30 AM to 5:30 PM
    • Centre: SITE DISTANT (W. Europe )
    • Langue: Français

    EUR3,890.00

    • Modalité: Classe inter à distance
    • Date: 18-22 mai, 2026 | 9:00 AM to 5:00 PM
    • Centre: SITE DISTANT (W. Europe )
    • Langue: Anglais

    EUR3,890.00

    • Modalité: Classe inter à distance
    • Date: 13-17 juillet, 2026 | 10:00 AM to 6:00 PM
    • Centre: SITE DISTANT (W. Europe )
    • Langue: Anglais

    EUR3,890.00

Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals,

Objectifs de la formation

Haut de page

After completing this course you should have gained the following Advanced Pentesting skills:

  • Advanced Windows Attacks
  • Attacking IoT Systems
  • Advanced Binary Exploitation.
  • Bypassing Filtered Networks
  • Pentesting Operational Technology (OT)
  • Access Hidden Networks with Pivoting
  • Pivoting & Double Pivoting
  • Privilege Escalation
  • Evasion Techniques
  • Attack Automation
  • Weaponizing Exploits
  • Professional Reporting

Programme détaillé

Haut de page

Introduction to Penetration Testing and Methodolgies

  • Principles and Objectives of Penetration Testing
  • Penetration Testing Methodologies and Frameworks
  • Best Practices and Guidelines for Penetration Testing
  • Role of Artificial Intelligence in Penetration Testing
  • Role of Penetration Testing in Compliance with Laws, Acts, and Standards

Penetration Testing Scoping and Engagement

  • Penetration Testing: Pre-engagement Activities
  • Key Elements Required to Respond to Penetration Testing RFPs
  • Drafting Effective Rules of Engagement (ROE)
  • Legal and Regulatory Considerations Critical to Penetration Testing
  • Resources and Tools for Successful Penetration Testing
  • Strategies to Effectively Manage Scope Creep

Open Source Intelligence (OSINT) and Attack Surface Mapping

  • Collecting Open-source Intelligence (OSINT) on Target's Domain Name
  • Collecting OSINT about Target Organization on the Web
  • Open Source Intelligence (OSINT) using Automation Tools
  • Attack Surface Mapping

Social Engineering Penetration Testing

  • Social Engineering Penetration Testing Concepts
  • Off-Site Social Engineering Penetration Testing
  • On-Site Social Engineering Penetration Testing
  • Document Findings with Countermeasure Recommendations

Web Application Penetration Testing

  • Security Frame vs. Vulnerabilities vs. Attacks
  • OWASP Penetration Testing Framework
  • Web Application Footprinting and Enumeration Techniques
  • Techniques for Web Vulnerability Scanning
  • Test for Vulnerabilities in Application Deployment and Configuration
  • Techniques to Assess Identity Management, Authentication, and Authorization Mechanisms
  • Evaluate Session Management Security
  • Evaluate Input Validation Mechanisms
  • Detect and Exploit SQL Injection Vulnerabilities
  • Techniques for Identifying and Testing Injection Vulnerabilities
  • Exploit Improper Error Handling Vulnerabilities
  • Identify Weak Cryptography Vulnerabilities
  • Test for Business Logic Flaws in Web Applications
  • Evaluate Applications for Client-Side Vulnerabilities

API and Java Web Token Penetration Testing

  • API and Java Web Tokens (JWT) Penetration Testing
  • Techniques and Tools to Perform API Reconnaissance
  • Test APIs for Authentication and Authorization Vulnerabilities
  • Evaluate the security of JSON Web Tokens (JWT)
  • Test APIs for Input Validation and Injection Vulnerabilities
  • Test APIs for Security Misconfiguration Vulnerabilities
  • Test APIs for Rate Limiting and Denial of Service (DoS) Attacks
  • Test APIs for Security of GraphQL implementations
  • Test APIs for Business Logic Flaws and Session Management

Perimeter Defense Evasion Techniques

  • Techniques to Evaluate Firewall Security Implementations
  • Techniques to Evaluate IDS Security Implementations
  • Techniques to Evaluate the Security of Routers
  • Techniques to Evaluate the Security of Switches

Windows Exploitation and Privilege Escalation

  • Windows Pen Testing Methodology
  • Techniques to Perform Vulnerability Assessment and Exploit Verification
  • Methods to Gain Initial Access to Windows Systems
  • Techniques to Perform Enumeration with User Privilege
  • Techniques to Perform Privilege Escalation
  • Post-Exploitation Activities

Active Directory Penetration Testing

  • Architecture and Components of Active Directory
  • Active Directory Reconnaissance
  • Exploit Identified Active Directory Vulnerabilities
  • Role of Artificial Intelligence in AD Penetration Testing Strategies

Linux Exploitation and Privilege Escalation

  • Linux Exploitation and Penetration Testing Methodologies
  • Linux Reconnaissance and Vulnerability Scanning
  • Techniques to Gain Initial Access to Linux Systems
  • Linux Privilege Escalation Techniques

Reverse Engineering, Fuzzing and Binary Exploitation

  • Concepts and Methodology for Analyzing Linux Binaries
  • Methodologies for Examining Windows Binaries
  • Buffer Overflow Attacks and Exploitation Methods
  • Concepts, Methodologies, and Tools for Application Fuzzing

Lateral Movement and Pivoting

  • Advanced Lateral Movement Techniques
  • Advanced Pivoting and Tunneling Techniques to Maintain Access

IoT Penetration Testing

  • Fundamental Concepts of IoT Pen Testing
  • Information Gathering and Attack Surface Mapping
  • Analyze IoT Device Firmware
  • In-depth Analysis of IoT Software
  • Assess the Security of IoT Networks and Protocols
  • Post-Exploitation Strategies and Persistence Techniques
  • Comprehensive Pen Testing Reports

Report Writing and Post Testing Actions

  • Purpose and Structure of a Penetration Testing Report
  • Essential Components of a Penetration Testing Report
  • Phases of a Pen Test Report Writing
  • Skills to Deliver a Penetration Testing Report Effectively
  • Post-Testing Actions for Organizations
  •  

    Pré-requis

    Haut de page

    Attendees should meet the following prerequisites:

    • It is recommended but not mandated that students have followed the EC-Council CEH Course and CEH Practical exam before enrolling for this course.
    • Advanced knowledge in Networking Protocols
    • Knowledge in Kali or ParrotOS and common Penetration Testing Tools
    • Knowledge in Exploiting Windows and Linux Hosts
    • Knowledge in Privilege Escalation in Linux and Windows
    • Knowledge in Wireless Penetration Testing
    • Knowledge in Web Application Penetration Testing
    Pré-requis recommandés :

    Certification

    Haut de page

    Recommended as preparation for the following exam:

    • CPENT - Certified Penetration Testing Professional

    Please note:

    CPENT is a fully online, remotely proctored practical exam that challenges candidates through a grueling 24-hour performance-based, hands-on exam. The exam is broken into 2 practical exams of 12-hours each that will test your perseverance and focus by forcing you to outdo yourself with each new challenge. Candidates have the option to choose either 2 12-hour exams or one 24-hour exam.

    Candidates who score more than 70% will earn the CPENT certification. Candidates who score more than 90% attain the prestigious LPT (Master) credential!

     

    Cookie Control toggle icon