Course Objectives
This course will prepare participants to sit for CPENT Examination.
After completing this course, you will be able to gain a comprehensive, up-to-date and in-depth knowledge of the following:
Key objectives:
- Learn various fundamental concepts about penetration testing including its importance, types, process, phases, and methodologies.
- Learn how to initiate, engage, and proceed with a penetration testing assignment
- Learn various skills and techniques to gather intelligence about the target from various publicly available sources.
- Learn how to implement a comprehensive penetration testing methodology for assessing human behaviors that increases susceptibility to potential social engineering attacks.
- Learn how to implement a comprehensive penetration testing methodology for assessing network from outsider’s perspectives.
- Learn how to implement a comprehensive penetration testing methodology for assessing network from insider’s perspectives.
- Learn how to implement a comprehensive penetration testing methodology for assessing security of network perimeter devices, such as Firewalls, IDSes, Routers and Switches.
- Learn how to implement a comprehensive penetration testing methodology for assessing security of organization’s web applications and web servers.
- Learn how to implement a comprehensive penetration testing methodology for assessing security of organization’s wireless infrastructure.
- Learn how to establish a process for assessing IoT devices, extracting firmware from devices, mount and run a firmware image and explore IoT exploitation.
- Learn about the challenges in industrial control systems (ICS), supervisory control and data acquisition (SCADA) testing, reviewing ICS/SCADA network protocols, analyze Modbus network traffic, and modifying ICS/SCADA network data.
- Learn how to implement a comprehensive penetration testing methodology for assessing security of organization’s cloud infrastructure.
- Learn about binary exploitation, buffer-overflow concepts, reviewing memory layout for stacks, analyze the memory and look for weaknesses, modifying the execution of a program, and bypass basic stack protections.
- Learn how to write a comprehensive penetration testing report for the target audience.
Pre-requisites
Knowledge, Skills & Experience
It is recommended that the participant have at least 1 years of relevant working experience in IT industry with knowledge in the area of Ethical Hacking / network security.
Recommended courses prior to taking CPENT:
- CompTIA A+
- CompTIA Network +
- CompTIA Security+
- ISACA Cybersecurity Fundamentals
- Identity and Access Management Essentials (SF)
- EC-Council Certified Network Defender (CND) (SF)
- EC-Council Certified Ethical Hacker (CEH) (SF)
Recommended for Career Path Advancement
- EC Council Computer Hacking Forensic Investigator (CHFI) (For Incident Response and Forensics)
- EC Council Certified Incident Handler (ECIH) (For Incident Response and Forensics)
- EC Council Certified SOC Analyst (CSA) (For SOC Operations)
- Cisco CCNA Cyber Security Operations (For SOC Operations)
- ISC2 Certified Information Systems Security Professional (CISSP) (For Security Engineer)
- Certificate of Cloud Auditing Knowledge (CCAK) (For Cloud Security)
- ISC2 Certified Cloud Security Professional (CCSP) (For Cloud Security)
Hardware & Software
This course will be conducted as a Virtual Live Class (VLC) via Zoom platform. Participants must own a zoom account and have a laptop or a desktop with “Zoom Client for Meetings” installed. This can be downloaded from https://zoom.us/download.
System Requirement |
Must Have:
Please ensure that your computer or laptop meets the following requirements.
Good to Have:
Not Recommended: Using tablets is not recommended due to their smaller screen size, which could cause eye strain and discomfort over the course of the program's duration. |
Course Outline
- Introduction to Penetration Testing and Methodologies
- Penetration Testing Scoping and Engagement
- Open Source Intelligence (OSINT)
- Social Engineering Penetration Testing
- Network Penetration Testing – External
- Network Penetration Testing – Internal
- Network Penetration Testing – Perimeter Devices
- Web Application Penetration Testing
- Wireless Penetration Testing
- IoT Penetration Testing
- OT and SCADA Penetration Testing
- Cloud Penetration Testing
- Binary Analysis and Exploitation
- Report Writing and Post Testing Actions
Certificate Obtained and Conferred by
- Certificate of Completion from NTUC LearningHub
Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a Certificate of Completion from NTUC LearningHub.
- Statement of Attainment (SOA) from SkillsFuture Singapore
Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a SOA from SkillsFuture Singapore to certify that the participant has achieved the following Competency Standard(s): • ICT-DIT-4012-1.1 Security Assessment and Testing
External Certification
After students take and pass the optional exam, they will receive a Certified Pen Testing Professional Certificate from EC-Council.
Categories
More Information
- NTUC LearningHub
Add a review