CPENT- Certified Penetration Testing

  • Home
  • CPENT- Certified Penetration Testing
Course Image

COURSE DESCRIPTION

With C|PENT, Learn Next-Generation Techniques and Methodologies for Handling Real-World Threat Situations

The following are 12 reasons that make the C|PENT Program one of a kind. This exceptional course can make you one of the most advanced Penetration Testers in the world. The course has one purpose: To help you overcome some of the most advanced obstacles that real-world practitioners face when conducting Penetration tests. Here are some examples of the challenges you will face when you are exposed to the C|PENT Range:
1. ADVANCED WINDOWS ATTACKS
This zone contains a complete forest that you first have to gain access to and once you do, your challenge is to use PowerShell and any other means to execute Silver and Gold Ticket and Kerberoasting. The machines will be configured with defenses in place; therefore, you will have to use PowerShell bypass techniques and other advanced methods to score points within the zone.
2 . ATTACKING IOT SYSTEMS
With the popularity of IOT devices, this is the first Program that requires you to locate the IOT device(s) then gain access to the network. Once on the network, you must identify the firmware of the IOT device, extract it and then reverse engineer it.
3. WRITING EXPLOITS: ADVANCED BINARIES EXPLOITATION
The challenges faced by Penetration Testers today require them to use their own skills to find a flaw in the code. In this zone you will be required to find the flawed binaries, reverse engineer them once found, and then write exploits to take control of the program execution.
The task is complicated and requires Penetration from the perimeter to gain access then discover the binaries. Once successful, you must reverse engineer the code. Unlike other certifications, this will not just be a simple 32-bit code. There will be 32- and 64-bit code challenges, and some of the code will be compiled with the basic protections of non-executable stacks.
Furthermore, you must be able to write a driver program to exploit these binaries, then discover a method to escalate privileges. This will require advanced skills in binary exploitation that include the latest debugging concepts and egg hunting techniques. You are required to craft input code first to take control of program execution and second to map an area in memory to get your shellcode to work and bypass system protections.

Information for teachers and students, Event information and education news

Contact us