Certified Penetration Testing Professional
Master effective pen testing across filtered networks with C|PENT. This multidisciplinary, hands-on course covers advanced Windows, IoT/OT, exploit writing, and binary exploitation.



This Course Is Ideal For
Penetration Testers
Ethical Hackers
Information security Consultant
Security Testers
Security Analysts
Security Engineers
Network Server Administrators
Firewall Administrators
System Administrators
Risk Assessment Professionals
Penetration Testers
Ethical Hackers
Information security Consultant
Security Testers
Security Analysts
Security Engineers
Network Server Administrators
Firewall Administrators
System Administrators
Risk Assessment Professionals
Penetration Testers
Ethical Hackers
Information security Consultant
Security Testers
Security Analysts
Security Engineers
Network Server Administrators
Firewall Administrators
System Administrators
Risk Assessment Professionals
What to Expect In This Course
SKILL LEVEL
Intermediate
DURATION
40 hours
CERTIFICATION
After Completion
LANGUAGE
English
Skill You Will Learn
Learn how to scope engagements, define objectives, communicate with stakeholders, and stick to ethical and legal boundaries.
Master OSINT techniques to gather intelligence and map an organization's attack surface.
Understand social engineering techniques and how to prevent them.
Test web apps and APIs for vulnerabilities like SQL injection, XSS, authentication flaws, JWT issues, and misconfigurations.
Learn to bypass firewalls and IDSs, navigate networks, access systems, and pivot to critical assets.
Exploit Windows vulnerabilities for privilege escalation and test Active Directory weaknesses.
Discover techniques for exploiting Linux systems and escalating privileges.
Use techniques like reverse engineering, fuzzing, and binary exploitation to find and exploit software weaknesses.
Find and exploit vulnerabilities in IoT devices and their ecosystems.
Learn how to scope engagements, define objectives, communicate with stakeholders, and stick to ethical and legal boundaries.
Master OSINT techniques to gather intelligence and map an organization's attack surface.
Understand social engineering techniques and how to prevent them.
Test web apps and APIs for vulnerabilities like SQL injection, XSS, authentication flaws, JWT issues, and misconfigurations.
Learn to bypass firewalls and IDSs, navigate networks, access systems, and pivot to critical assets.
Exploit Windows vulnerabilities for privilege escalation and test Active Directory weaknesses.
Discover techniques for exploiting Linux systems and escalating privileges.
Use techniques like reverse engineering, fuzzing, and binary exploitation to find and exploit software weaknesses.
Find and exploit vulnerabilities in IoT devices and their ecosystems.
Learn how to scope engagements, define objectives, communicate with stakeholders, and stick to ethical and legal boundaries.
Master OSINT techniques to gather intelligence and map an organization's attack surface.
Understand social engineering techniques and how to prevent them.
Test web apps and APIs for vulnerabilities like SQL injection, XSS, authentication flaws, JWT issues, and misconfigurations.
Learn to bypass firewalls and IDSs, navigate networks, access systems, and pivot to critical assets.
Exploit Windows vulnerabilities for privilege escalation and test Active Directory weaknesses.
Discover techniques for exploiting Linux systems and escalating privileges.
Use techniques like reverse engineering, fuzzing, and binary exploitation to find and exploit software weaknesses.
Find and exploit vulnerabilities in IoT devices and their ecosystems.
Programme Module
Module 01
Module 02
Module 03
Module 04
Module 05
Module 06
Module 07
Module 08
Module 09
Module 10
Module 11
Module 12
Module 13
Module 14
Programme Module
Module 01
Module 02
Module 03
Module 04
Module 05
Module 06
Module 07
Module 08
Module 09
Module 10
Module 11
Module 12
Module 13
Module 14
Outcomes of the Course
By the end of this course, participants will be able to:
Master penetration testing skills, applying diverse techniques and tools to identify and exploit system vulnerabilities.
Execute a repeatable penetration testing methodology, ensuring thorough, consistent, and efficient assessments.
Adhere to the penetration testing code of ethics, conducting all activities with integrity, professionalism, and respect for legal and privacy.
Present analyzed results in structured reports, effectively communicating findings, risks, and remediation strategies to stakeholders.
By the end of this course, participants will be able to:
Master penetration testing skills, applying diverse techniques and tools to identify and exploit system vulnerabilities.
Execute a repeatable penetration testing methodology, ensuring thorough, consistent, and efficient assessments.
Adhere to the penetration testing code of ethics, conducting all activities with integrity, professionalism, and respect for legal and privacy.
Present analyzed results in structured reports, effectively communicating findings, risks, and remediation strategies to stakeholders.
By the end of this course, participants will be able to:
Master penetration testing skills, applying diverse techniques and tools to identify and exploit system vulnerabilities.
Execute a repeatable penetration testing methodology, ensuring thorough, consistent, and efficient assessments.
Adhere to the penetration testing code of ethics, conducting all activities with integrity, professionalism, and respect for legal and privacy.
Present analyzed results in structured reports, effectively communicating findings, risks, and remediation strategies to stakeholders.
Content Provider



EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
Programme Module
Module 01
Module 02
Module 03
Module 04
Module 05
Module 06
Module 07
Module 08
Module 09
Programme Module
Module 01
Module 02
Module 03
Module 04
Module 05
Module 06
Module 07
Module 08
Module 09
Module Title 9
Module Title 10
Module Title 11
Module Title 12
Module Title 13