NTUC LearningHub

Course Objectives

 

This course will prepare participants to sit for CPENT Examination.

 

After completing this course, you will be able to gain a comprehensive, up-to-date and in-depth knowledge of the following:

Key objectives:

  • Learn various fundamental concepts about penetration testing including its importance, types, process, phases, and methodologies.
  • Learn how to initiate, engage, and proceed with a penetration testing assignment
  • Learn various skills and techniques to gather intelligence about the target from various publicly available sources.
  • Learn how to implement a comprehensive penetration testing methodology for assessing human behaviors that increases susceptibility to potential social engineering attacks.
  • Learn how to implement a comprehensive penetration testing methodology for assessing network from outsider’s perspectives.
  • Learn how to implement a comprehensive penetration testing methodology for assessing network from insider’s perspectives.
  • Learn how to implement a comprehensive penetration testing methodology for assessing security of network perimeter devices, such as Firewalls, IDSes, Routers and Switches.
  • Learn how to implement a comprehensive penetration testing methodology for assessing security of organization’s web applications and web servers.
  • Learn how to implement a comprehensive penetration testing methodology for assessing security of organization’s wireless infrastructure.
  • Learn how to establish a process for assessing IoT devices, extracting firmware from devices, mount and run a firmware image and explore IoT exploitation.
  • Learn about the challenges in industrial control systems (ICS), supervisory control and data acquisition (SCADA) testing, reviewing ICS/SCADA network protocols, analyze Modbus network traffic, and modifying ICS/SCADA network data.
  • Learn how to implement a comprehensive penetration testing methodology for assessing security of organization’s cloud infrastructure.
  • Learn about binary exploitation, buffer-overflow concepts, reviewing memory layout for stacks, analyze the memory and look for weaknesses, modifying the execution of a program, and bypass basic stack protections.
  • Learn how to write a comprehensive penetration testing report for the target audience.

 

Pre-requisites

 

Knowledge, Skills & Experience

It is recommended that the participant have at least 1 years of relevant working experience in IT industry with knowledge in the area of Ethical Hacking / network security.

 

Recommended courses prior to taking CPENT:

  • CompTIA A+
  • CompTIA Network +
  • CompTIA Security+
  • ISACA Cybersecurity Fundamentals
  • Identity and Access Management Essentials (SF)
  • EC-Council Certified Network Defender (CND) (SF)
  • EC-Council Certified Ethical Hacker (CEH) (SF)

 

Recommended for Career Path Advancement

 

  • EC Council Computer Hacking Forensic Investigator (CHFI) (For Incident Response and Forensics)
  • EC Council Certified Incident Handler (ECIH) (For Incident Response and Forensics)
  • EC Council Certified SOC Analyst (CSA) (For SOC Operations)
  • Cisco CCNA Cyber Security Operations (For SOC Operations)
  • ISC2 Certified Information Systems Security Professional (CISSP) (For Security Engineer)
  • Certificate of Cloud Auditing Knowledge (CCAK) (For Cloud Security)
  • ISC2 Certified Cloud Security Professional (CCSP) (For Cloud Security)

Hardware & Software
This course will be conducted as a Virtual Live Class (VLC) via Zoom platform. Participants must own a zoom account and have a laptop or a desktop with “Zoom Client for Meetings” installed. This can be downloaded from https://zoom.us/download.

System Requirement

Must Have:

Please ensure that your computer or laptop meets the following requirements.

  • Operating system: Windows 10 or MacOS (64 bit or above)
  • Processor/CPU: 1.8 GHz, 2-core Intel Core i3 or higher
  • Minimum 20 GB hard disk space.
  • Minimum 8 Gb RAM
  • Webcam (The camera must be turned on for the duration of the class)
  • Microphone
  • Internet Connection: Wired or Wireless broadband
  • Latest version of Zoom software to be installed on computer or laptop prior to the class.

Good to Have:

  • Wired internet connection
    Wired internet will provide you with stable and reliable connection.
  • Dual monitors
    Using a dual monitor setup will undoubtedly improve your training experience, enabling you to simultaneously participate in hands-on exercises and maintain engagement with your instructor.>

Not Recommended:

Using tablets is not recommended due to their smaller screen size, which could cause eye strain and discomfort over the course of the program's duration.

 

Course Outline

 

  • Introduction to Penetration Testing and Methodologies
  • Penetration Testing Scoping and Engagement
  • Open Source Intelligence (OSINT)
  • Social Engineering Penetration Testing
  • Network Penetration Testing – External
  • Network Penetration Testing – Internal
  • Network Penetration Testing – Perimeter Devices
  • Web Application Penetration Testing
  • Wireless Penetration Testing
  • IoT Penetration Testing
  • OT and SCADA Penetration Testing
  • Cloud Penetration Testing
  • Binary Analysis and Exploitation
  • Report Writing and Post Testing Actions

 

Certificate Obtained and Conferred by

 

  • Certificate of Completion from NTUC LearningHub

Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a Certificate of Completion from NTUC LearningHub.

  • Statement of Attainment (SOA) from SkillsFuture Singapore

Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a SOA from SkillsFuture Singapore to certify that the participant has achieved the following Competency Standard(s):  • ICT-DIT-4012-1.1 Security Assessment and Testing

 

External Certification

After students take and pass the optional exam, they will receive a Certified Pen Testing Professional Certificate from EC-Council.

Categories
More Information
  • NTUC LearningHub
  • No comments yet.
  • Add a review
    error: Content is protected !!