Login     Signup
   info@zetlantechnologies.com        +91-8680961847

  /   EC-Council Certification   /   CPENT

Certified Penetration Testing Professional

Penetration Testing Certification



Introduction to Certified Penetration Testing (C|PENT)


The Certified Penetration Testing Professional or C|PENT Certification, for short, re-writes the standards of penetration testing skill development.

EC-Council's Certified Penetration Testing Professional (C|PENT) program teaches you how to perform an effective penetration testing in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, C|PENT's live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own expoitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.

The heart of the C|PENT course is all about helping you master your pen testing skills by putting them to use on our live cyber ranges. The certified penetration testing ranges were designed to be dynamic in order to give you a real-world training program, so just as targets and technology continue to change in live networks, both the C|PENT) practice and exam ranges will mimic this reality as our team of engineers continue to add targets and defenses throughout the C|PENT course's lifetime


Program Information




What Will You Learn ?


Advanced Windows Attacks

Access active directories. Power your way through network defenses using PowerShell to execute Silver and Gold Ticket and Kerberoasting


Attacking IoT Systems

C|PENT is the 1st certification in the world to each IoT attacks


Writing Exploits: Advanced Binary Exploitation

Go beyond advanced application security testing techniques and experience the thrill of exploiting vulnerabilities in flawed binaries across 32-and 64-bit code challenges


Bypassing a Filtered Network

Unlike flat networks that most certifications train in, access web applications and extract data through a series of filtered networks with C|PENT


Pentesting Operational Technology (OT)

C|PENT is the world's first pen testing certification that allows you to intercept Modbus communication protocol and communicate between PLC and its slave nodes


Access Hidden networks with Pivoting

Learn lateral movement and what it means to pivot through filtered networks.


Double Pivoting

If you think pivoting is hard, wait until you try double pivoting!


Privilege Escalation

Gain root access by mastering privilege escalation techniques.


Evading Defense Mechanisms

We don't just teach ou to write exploits; we teach you to how to bypass protections.


Attack Automation with Scripts

A key skill for most exployers, we'll teach you to go beyond tools!


Weaponize Your Exploits

Pentesting tools not enough for you? Here's your chance to learn to build your own armory.


Write Professional Reports

Learn classic pen testing skills from experts.




Who Is It For?


  • Ethical Hackers
  • Penetration testers
  • Network Server Administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and Risk Assessment Professionals
  • Cybersecurity Forensic Analyst
  • Cyberthreat Analyst
  • Cloud Security
  • Analyst information Security Consultant
  • Application Security
  • Cybersecurity Assurance Engineer
  • Security Operations Center (SOC) Analyst
  • Technical Operations Network Engineer
  • Information Security Engineer
  • Network Security Penetration Tester
  • Network Security Engineer
  • Inforamtion Security Architect


A Hands-On Exam Like No Other


C|PENT is a fully online, remotely proctored practical exam that challenges you through a grueling 24-hours performance-based, hands-on exam. The exam is broken into two practical exams of 12-hours each that will test your perseverance and focus by forcing you to outdo yourself with each new challenge. You have the option to choose either two 12-hour exam or one 24-hour exam.


Candidates who score more than 70% will earn the C|PENT certification. Candidates who score more than 90% attain the prestigious LPT (Master) credential!

Exam Features




Course Details

1. Introduction to Penetration Testing

  • Penetration Testing
  • Penetration Testing Service Delivery Models
  • ROI for Penetration Testing
  • Types of Penetration Assessment
  • Strategies of Penetration Testing
  • Selection of Appropriate Testing Type
  • Different methods of Penetration Testing
  • Common Area of Penetration Testing
  • Penetration Testing Process
  • Penetration Testing Phases
  • Penetration Testing Methodologies
  • EC-Council LPT Methodology
  • Qualities of a Licensed Penetration Tester
  • Characteristics of Good Penetration test
  • Ethics of a Penetration tester

  • Pre-engagement Activities
  • Initiation of a Pen Testing Engagement Process
  • Rules of Engagement
  • Penetration Testing Schedule
  • Identifying the Reporting Time Scales
  • Deciding the time of day for the Test
  • ROE Document
  • Penetration Testing contract
  • Penetration Testing Rules of Behaviour
  • Confidentiality and Nondisclosure Agreement Clauses
  • Identifying the Security Tools Required for the Penetration Test
  • Preparing the Test Plan
  • Penetration Testing Hardware/Software Requirements
  • Mission Briefing
  • Scope Creeping

  • OSINT through the WWW
  • OSINT through website Analysis
  • OSINT through DNS Interrogation
  • Who is Lookups
  • Reverse Lookups
  • DNS Zone Transfer
  • Traceroute Analysis
  • Automating the OSINT Process using Tools / Frameworks / Scripts

  • Social Engineering Penetration Testing
  • Social Engineering Penetration Testing Modes
  • Social Engineering Penetration Testing Process
  • Social Engineering Using Email
  • Phishing
  • Spear Phishing
  • Whaling
  • Phone (Vishing)
  • SmiShing (SMS Phishing)
  • Social Engineering Using Physical Attack Vector
  • Piggybacking / Tailgating
  • Eavesdropping
  • Dumpster Diving
  • Reverse Social Engineering
  • Social Engineering Using Motivation Techniques
  • Social Engineering Countermeasures

  • Network Penetration Testing
  • External vs Internal Penetration Testing
  • External network Penetration Testing
  • Internal network Penetration Testing
  • Network Penetration Testing Process
  • Port Scanning
  • Fingerprinting the OS
  • Examining the Patches Applied to the Target OS
  • Fingerprinting the Services
  • External Vulnerability Assessment
  • Searching and Mapping the Target with the Associated Security Vulnerabilities
  • Find out the Security Vulnerability Exploits
  • Running the Exploits against Identified Vulnerabilities

  • Interna Network Penetration Testing
  • Footprinting
  • Network Scanning
  • Scanning Analysis
  • Scanning Methodology
  • OS and Service Fingerprinting
  • Identifying the OS
  • SMB OS Discovery
  • Manual Banner Grabbing
  • Identifying the services
  • Displaying services within Metasploit
  • Map the internal network
  • Enumeration
  • Vulnerability assessment
  • Internal Vulnerability Assessment Report
  • Scan Analysis Process
  • Windows Exploitation
  • Unix / Linux Exploitation
  • Attempt Repay Attacks
  • Attempt ARP Poisoning
  • Attempt Mac Flooding
  • Conduct a Man-in-the-Middle Attack
  • Attempt DNS Poisoning
  • Automated Internal Network Penetration Testing
  • Post Exploitation
  • Pivoting
  • Port Forwarding
  • OS Discovery
  • Proxychains
  • Web Shells

  • Assessing Firewall Security Implementation
  • Testing the Firewall from Both Sides
  • Find Information about the Firewall
  • Enumerate Firewall Access Control List Using Nmap
  • Scan the firewall for Vulnerabilities
  • Trying to Bypass the Firewall using various Techniques
  • Assessing IDS Security Implementation
  • Common Techniques used to Evade ISD System
  • Test for Resource Exhaustion
  • Test the IDS by using various Techniques
  • Assessing security of Router Operating System and its cersion
  • Identify Protocols Running
  • Gain Access to the Router
  • IP Spoofing
  • Router Penetration Testing using secure Cisco Auditor (SCA)
  • Assessing Security of Switches
  • Test for Address of Cache Size
  • Test for Data Integrity and Error Checking
  • Test for Frame Error Filtering
  • Test for VLAN Hopping
  • Test for MAC table Flooding
  • Testing for ARP Attack

  • Web Application Penetration Testing
  • Web Application Security Frame
  • Security Frame vs Vulnerabilities vs Attacks
  • Website Footprinting
  • Web Enumeration
  • Discover Web Application Default Content
  • Discover Web application Hidden Content
  • Conduct Web Vulnerability Scanning
  • Test for SQL Injection Vulnerabilities
  • Test for XSS Vulnerabilities
  • Test for Parameter Tampering
  • Test for Weak Cryptography Vulnerabilities
  • Tests for Security Misconfiguration Vulnerabilities
  • Test for Client-Side Attack
  • Test for Broken Authentication and Authorization Vulnerabilities
  • Test for Broken Session Management Vulnerabilities
  • Test for Web Services Security
  • Test for Business Logic Flaws
  • Test for web Server Vulnerabilities
  • Test for Tick Clients Vulnerabilities

  • Wireless Penetration Testing
  • Wireless Local Area network (WALN) Penetration Testing
  • Discovering the Wireless Networks
  • Detect Wireless Connections
  • Use a Wireless Honeypot to Discover Vulnerable wireless Clients
  • Preforming a Denia-of-service Attack
  • Attempt Rapid Traffic Generation
  • Attempt Single-packet Decryption
  • Perform an ARP Poisoning Attack
  • Creak WPA-PSK Keys
  • Creak WPA/WPA2 Enterprise Mode
  • Check for MAC Filtering
  • Spoof the MAC Address
  • Create a Direct Connection to the Wireless Access Point
  • Introduction to RFID Penetration Testing
  • Perform Reverse Engineering
  • Perform Power Analysis Attack
  • Perform Eavesdropping
  • Perform an MITM Attack
  • Perform a DoS Attack
  • Perform RFID Cloning / Spoofing
  • Perform an RFID Replay attack
  • Perform a Virus Attack
  • Oscilloscopes
  • RFID Antennas
  • RFID Readers
  • Introduction to NFC Penetration Testing
  • Perform a Data Modification Attack
  • Perform Data Corruption Attack
  • Perform a MITM Attack

  • IoT
  • Popular IoT Hacks
  • IoT Challengers
  • IoT Penetration Testing
  • Abstract IoT testing Methodology
  • Attack Surface Mapping
  • IoT Architecture
  • Typical IoT Vulnerabilities
  • Steps to Analysing the IoT Hardware
  • Firewall Attacks
  • Attack Surface Map
  • Sample Firewall Analysis Process
  • Binwalk to Extract the File System
  • Exploring the File System
  • Firmware Emulation

  • IT vs OT System Architecture
  • ICS / SCADA Protocols
  • Modbus
  • ICS and SCADA Pen Testing
  • Attack Monitoring
  • Testing Environment
  • Penetration Testing Actions
  • Host Attack Types
  • Network Attack Types
  • Port of SCADA
  • Attack Modification
  • OT Testing Tools
  • BACnet
  • Commercial SCADA Fuzzing Tool
  • Danger of Port Scanning
  • Types of Vulnerability Scans
  • Device Separation
  • ICS Cyber test Impact

  • Cloud Computing Security and Concerns
  • Security Risk Involved in Cloud Computing
  • Role of Penetration Testing in Cloud Computing
  • Scope of Cloud Pen Testing
  • Shared Responsibilities in Cloud
  • Penetration Testing Process
  • Identifying the Type of Cloud to be Tested
  • Identifying Tools for Penetration Testing
  • Perform a Detailed Vulnerability Assessment
  • AWS Specific Penetration Testing
  • Attempt to Identify S3 Buckets
  • Azure Specific Penetration Testing
  • Google Cloud Platform Specific Penetration Testing
  • Google Cloud’s Provision for Penetration Testing

  • Binary Coding
  • Machine Instructions
  • Sample Stack Frame
  • C Program Memory
  • Analyzing Binaries
  • Registers
  • Important IA-32 Instructions for Pen Testing
  • Executable and Linkable Format
  • Advanced Binary Analysis
  • Obfuscation Challenges
  • Binary Instrumentation
  • IA-64
  • Binary Analysis Methodology
  • Sample Program
  • ASLR
  • Return-to-libc vulnerability
  • Defeating the No-execute Stack
  • 64-bit Fundamentals
  • Attack using ROP

  • Goal of the Penetration Testing Report
  • Penetration Testing Deliverables
  • Report Formats
  • Types of Pen Test Reports
  • Characteristics of a Good Pen Testing Report
  • Phases of Report Development
  • Sample Pen Testing Report Format
  • Report Components
  • Penetration Testing Report Analysis
  • Section of the Penetration Testing Report
  • Pen Test Team Meeting
  • Research Analysis
  • Prioritize Recommendations
  • Delivering Penetration Testing Report
  • Letter of Attestation
  • Cleanup and Restoration
  • Report Retention
  • Sign-ff Document
  • Post-Testing Actions for Organizations
  • Develop an Action Plan
  • Develop and Implement data Backup Plan
  • Create a Process for Minimizing Misconfiguration Chances
  • Updates and Patches


Fees Structure : 32500 INR / 399 USD
Total No of Class : 273 Video Class
Class Duration : 175:30 Working Hours
Download Feature : Download Avalable
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Brochure       Buy Now       Sample Demo

Fees Structure : 22500 INR / 270 USD
Class Duration : 60 Days
Class Recording : Live Class Recording available
Class Time : Monday to Firday 1.5 hours per day / Weekend 3 Hours per day
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Download Brochure       Pay Online