TOIT Training

Penetration Testing Professional

Penetration Testing Professional
  • Overview
  • Curriculum
  • Reviews

 

This instructor led, online training course, provides students with all the knowledge they need to write exploits and build tools to outthink and thwart attacks. With groundbreaking penetration testing methods and techniques, this Penetration Testing course helps students perform intensive assessments required to effectively identify and mitigate security risks to computer systems, networks and infrastructures.

The CPENT certification is intended for Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals.

  • 11 Sections
  • 59 Lessons
  • 60h 15m Duration
Expand All

Reconnaissance

3 Lessons
  • OSINT
  • Active Recon
  • Subdomain Enumeration

Social Engineering

1 Lesson
  • Human Hackery

Phishing

3 Lessons
  • Attack Basics
  • Creating Campaigns
  • Phishing Documents

 Scanning and Target Enumeration

3 Lessons
  • DNS
  • Port Scanning with NMAP
  • Common Protocols and Ports

Penetration Testing Tools

5 Lessons
  • Netcat
  • SOCAT
  • PowerShell and Powercat
  • Wireshark
  • Tcpdump

Web Application Penetration Testing

4 Lessons
  • Engagement Scoping
  • General Toolsets
  • OWASP Top 10
  • OWASP Examples

 Internal Network Penetration Testing

11 Lessons
  • Internal Network Penetration Testing Overview
  • Active Directory Overview
  • LLMNR Poisoning
  • SMB Relay Attacks
  • Man-In-The-Middle6
  • Enumeration for Additional Attack Vectors
  • Pass the Hash / OverPasstheHash
  • Kerberoasting
  • GPP & cPassword Attack
  • Golden Ticket Attacks
  • Crackmapexec

Binary Analysis and Exploitation Overview

7 Lessons
  • Buffer Overflow Overview
  • Fuzzing
  • Finding the Offset
  • Overwriting the EIP
  • Finding Bad Characters
  • Generating Shellcode
  • Exploitation

Wireless Penetration Testing

5 Lessons
  • Wireless Penetration Testing Overview
  • Attacking Access Points
  • Wired Equivalent Privacy
  • Wi-Fi Protected Access
  • Internet of Things Pentesting

 Industrial Control System and Supervisory Control

9 Lessons
  • Industry Control Systems and Supervisory Control and Data Acquisition Penetration Testing
  • ICS Cyber Kill Chain
  • Programmable Logic Controller Systems
  • Shodan for Networked Systems
  • Networking Scanning for ICS
  • NMAP with Tuning for SCADA
  • Simple Network Management Protocols
  • PLCScan
  • Metasploit Modbusdetect Module

Cloud Penetration Testing

8 Lessons
  • Cloud Penetration Testing Overview
  • Amazon Web Services
  • Bucket Enumeration
  • AWS Lambda
  • Bloodhound with Azurehound
  • ADConnect Exploitation
  • Google Cloud Platform
  • Purple Panda

0

0 Ratings
5 Star 0%
4 Star 0%
3 Star 0%
2 Star 0%
1 Star 0%

Reviews

Free

Start Course

Retake Course

Are you sure you want to retake the course? This action will permanently delete all your progress in this course.

Course Includes

  • Better understand reconnaissance tools like passive vs active information gathering, active recon, and more
  • Describe the different types of phishing
  • Scan and target enumeration
  • Describe and use the different penetration testing tools, such as Wireshark, Powershell, Powercat, and more
  • Describe and use the different web application penetration testing tools
  • Describe and use the different internal network penetration testing tools
  • Utilize binary analysis and exploitation
  • Perform wireless and cloud penetration testing

Deleting Course Review

Are you sure? You can't restore this back

Course Access

This course is password protected. To access it please enter your password below:

Buy for group

Penetration Testing Professional
No groups Found

You don't have any groups yet

Create a group and add group members. Sync Group(s)