Login     Signup
   info@zetlantechnologies.com        +91-8680961847

  /   GIAC Certification   /   GPEN Certification

GIAC Penetration Tester Certification (GPEN)

Practitioner Certification

The GIAC Penetration Tester (GPEN) certification validates a practitioner's ability to properly conduct a penetration test using best-practice techniques and methodologies. GPEN certification holders have the knowledge and skills to conduct exploits, engage in detailed environmental reconnaissance, and utilize a process-oriented approach to penetration testing projects






Areas Covered


Who is GPEN for?


Exam Format

Note:GIAC reserves the right to change the specifications for each certification without notice. Based on a scientific passing point study, the passing point for the GISF exam has been determined to be 72% for all candidates receiving access to their certification attempts on or after June 12th, 2018.

Delivery

NOTE: All GIAC Certification exams are web-based and required to be proctored. There are two proctoring options: remote proctoring through ProctorU, and onsite proctoring through PearsonVUE.

Course Details

1. GIAC Penetration Tester Certification

  • Advanced Password Attacks
    • The candidate will be able to use additional methods to attack password hashes and authenticate.
  • Attacking Password Hashes
    • The candidate will be able to obtain and attack password hashes and other password representations.
  • Azure Applications and Attack Strategies
    • The candidate will demonstrate an understanding of Azure applications and the attacks against them including federated and single sign-on environments and Azure AD authentication protocols.
  • Azure Overview, Attacks, and AD Integration
    • The candidate will demonstrate an understanding of Entra ID implementation fundamentals, common Entra ID attacks, and Azure authentication techniques
  • Command and Control (C2)
    • The candidate will demonstrate an understanding of the design, application, and use of Command and Control (C2) and common C2 Frameworks.
  • Domain Escalation and Persistence Attacks
    • The candidate will demonstrate an understanding of common Windows privilege escalation attacks and Kerberos attack techniques that are used to consolidate and persist administrative access to Active Directory.
  • Escalation and Exploitation
    • The candidate will be able to demonstrate the fundamental concepts of exploitation, data exfiltration from compromised hosts and pivoting to exploit other hosts within a target network.
  • Exploitation Fundamentals
    • The candidate will be able to demonstrate the fundamental concepts associated with the exploitation phase of a pentest.
  • Kerberos Attacks
    • The candidate will demonstrate an understanding of attacks against Active Directory including Kerberos attacks.
  • Metasploit
    • The candidate will be able to use and configure the Metasploit Framework at an intermediate level.
  • Password Attacks
    • The candidate will understand types of password attacks, formats, defenses, and the circumstances under which to use each password attack variation. The candidate will be able to conduct password guessing attacks.
  • Password Formats and Hashes
    • The candidate will demonstrate an understanding of common password hashes and formats for storing password data.
  • Penetration Test Planning
    • The candidate will be able to demonstrate the fundamental concepts associated with pen-testing, and utilize a process-oriented approach to penetration testing and reporting.
  • Reconnaissance
    • The candidate will understand the fundamental concepts of reconnaissance and will understand how to obtain basic, high level information about the target organization and network, often considered information leakage, including but not limited to technical and non technical public contacts, IP address ranges, document formats, and supported systems.
  • Scanning and Host Discovery
    • The candidate will be able to use the appropriate technique to scan a network for potential targets, and to conduct port, operating system and service version scans and analyze the results.
  • Vulnerability Scanning
    • The candidate will be able to conduct vulnerability scans and analyze the results.


Fees Structure : 15500 INR / 185 USD
Total No of Class : 32 Video Class
Class Duration : 38:00 Working Hours
Download Feature : Download Avalable
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Brochure       Buy Now       Sample Demo

Fees Structure : 30000 INR / 355 USD
Class Duration : 60 Days
Class Recording : Live Class Recording available
Class Time : Monday to Firday 1.5 hours per day / Weekend 3 Hours per day
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Download Brochure       Pay Online