The in-class schedule is currently unavailable. Check our online instructor-led schedule or leave your contact details to send you schedule updates.
The Certified Penetration Testing Professional (CPENT Al) program is the world's most comprehensive guided penetration testing program. It offers a complete hands-on pentesting methodology and Al techniques mapped to all pentesting phases. CPENT Al enables you to master pentesting within an enterprise network environment, evaluating intrusion risks and compiling actionable, structured reports. Distinguish yourself with the CPENT Al, learning beyond technical knowledge—scoping engagements, understanding design, estimating effort, and presenting findings—and thrive as a leader in offensive security with versatile skills. CPENT Al combines guided learning with hands-on practice while immersing you in diverse live scenarios involving IOT systems, segmented networks, and advanced defenses, with practical challenges mapped to each domain. Gain expertise in advanced skills necessary to create your tools, conduct advanced binary exploitation, double pivot, customize scripts, and write your exploits to penetrate the deepest pockets of the network.
Hands-on course featuring CTFs, 110+ labs, live cyber ranges, and 50+ tools
Practical exam tests skills on unique multi-disciplinary network ranges
The only program to teach a complete pen testing methodology
Prepares you for VAPT compliance and various regulations
hours
30
language
English
Summary
The Certified Penetration Testing Professional (CPENT Al) program is the world's most comprehensive guided penetration testing program. It offers a complete hands-on pentesting methodology and Al techniques mapped to all pentesting phases. CPENT Al enables you to master pentesting within an enterprise network environment, evaluating intrusion risks and compiling actionable, structured reports. Distinguish yourself with the CPENT Al, learning beyond technical knowledge—scoping engagements, understanding design, estimating effort, and presenting findings—and thrive as a leader in offensive security with versatile skills. CPENT Al combines guided learning with hands-on practice while immersing you in diverse live scenarios involving IOT systems, segmented networks, and advanced defenses, with practical challenges mapped to each domain. Gain expertise in advanced skills necessary to create your tools, conduct advanced binary exploitation, double pivot, customize scripts, and write your exploits to penetrate the deepest pockets of the network.
Hands-on course featuring CTFs, 110+ labs, live cyber ranges, and 50+ tools
Practical exam tests skills on unique multi-disciplinary network ranges
The only program to teach a complete pen testing methodology
Prepares you for VAPT compliance and various regulations
Target Audience
Ethical Hackers
Penetration Testers
prerequisites
Ethical Hacking
Skills Gained
Certificate and Exam
The CPENT exam is a 100% practical exam and includes a penetration testing report submission.
Exam features:
Choose your challenge: Either two sessions of 12 hours each or a single 24-hour exam
EC-Council exams use multiple exam forms, each with its own cut score based on question
difficulty. Because of this, the pass score varies by exam form and can range from 60% to 85%.
certification
Key topics covered: Penetration Testing, Penetration Testing Process, Penetration Testing
Methodologies and Frameworks, MITRE ATT&CK Framework, Characteristics of a Good
Penetration Test, Al-Driven Penetration Testing, Al-Driven Tools for Penetration Testing,
Compliance-Driven Penetration Testing, Role of Al and Machine Learning in Compliance-Driven
Testing
Key topics covered: Preparing for Proposal Submission, Rules of Engagement, Drafting a ROE,
Drafting Penetration Testing Contract, Rules of Behavior, Nondisclosure Agreement, Liability
Issues, Engagement Letter, Kickoff Meeting, Statement of Work, Preparing the Test Plan, Data
Use Agreement, Mission Briefing, Scope Creeping
Labs:
Key topics covered: Find Domain and Subdomains, Whois Lookups, DNS Records, Reverse
Lookups, DNS Zone Transfer, Web Searches Using Advanced Operators, Google Dork, Footprint
Target Using Shodan, Email Harvesting, People Search Online Services, Automate OSINT
Process Using Tools/Frameworks, Attack Surface Mapping, Traceroute Analysis, Scanning
Target Network, Discover Live Hosts, Port Scanning, OS Banner Grabbing, Service
Fingerprinting
Labs:
Key topics covered: Social Engineering Penetration Testing Process, Off-Site Social
Engineering Penetration Testing, Phishing, Social Engineering Using Phone, Social Engineering
using Al and ML, On-Site Social Engineering Penetration Testing, Social Engineering
Countermeasures
Labs:
Key topics covered: OWASP Penetration Testing Framework, Website Footprinting, Web
Spidering, Website Mirroring, HTTP Service Discovery, Web Server Banner Grabbing, Test for
Default Credentials, Enumerate Webserver Directories, Web Vulnerability Assessment, Web
Application Fuzz Testing, Directory Brute Forcing, Web Vulnerability Scanning, Test Handling of
File Extensions, Test Backup and Unreferenced Files, Username Enumeration, Authorization
Attack, Insecure Access Control Methods, Session Token Sniffing, Session Hijacking, Cross-
Site Reauest Foraerv (XSRF). URL Parameter Tamoerina. SOL Iniection. LDAP Iniection, Improper Error Handling, logic Flaws, Frame Injection.
Labs:
Key topics covered: API Reconnaissance, Test APIs for Broken Authentication, Test APIs for
Object-Level Permissions (BOLA), Test for JWT Issues, Test APIs for SQL Injection
Vulnerabilities, Test APIs for Cross-Site Scripting (XSS), Fuzzing API Inputs, API Vulnerability
Scanning, Unsafe Consumption of APIs, API for Throttling and Rate Limiting Attacks, GraphQL
Issues, API for Workflows' Circumvention, API for Session Hijacking
Labs:
Key topics covered: Testing the Firewall, Locate the Firewall, Enumerate Firewall Access
Control List, Scan the Firewall for Vulnerabilities, Bypass the Firewall, IDS Penetration Testing,
Techniques Used to Evade IDS Systems, Test the IDS Using Different Techniques, Bypass IDS,
Router Testing Issues, Port Scan the Router, Test for Router Misconfigurations, Security
Misconfigurations in Switch, Test for OSPF Performance, Router and Switch Security Auditing Tool
Labs:
Key topics covered: Reconnaissance on Windows, Windows Vulnerability Scanning, Gain
Access to Windows System, Vulnerability Scanning and Exploit Suggestion using Al, Crack
Passwords, Gain Access to Windows Using Remote Shell, Exploit Buffer Overflow Vulnerability
on Windows, Meterpreter Post Exploitation, Escalating Privileges, LIAC Bypass, Antivirus
Evasion, Disable Windows Defender, Setup Backdoor at Boot, Evade Antivirus Detection
Labs:
Key topics covered: Active Directory, Active Directory Components, Active Directory
Reconnaissance, Enumerate Active Directory, Active Directory Service Interfaces (ADSI), Active
Directory Enumeration Tools, Password Spraying Attack, Active Directory Certificate Services
(AD CS), Exchange Server User Enumeration, Exploit Exchange Server, Extract Password
Hashes, Crack NTLM Hashes, Active Directory Exploitation, AD Enumeration using Al
Labs:
Key topics covered: IOT, Popular IOT Hacks, IOT Challenges, IOT Penetration Testing, Abstract
IOT Testing Methodology, Attack Surface Mapping, IOT Architecture, Typical IOT Vulnerabilities,
Steps to Analyzing the IOT Hardware, Firmware Attacks, Attack Surface Map, Sample
Architecture Diagram, Sample Firmware Analysis Process, Binwalk to Extract the File System,
Exploring the File System, Firmware Emulation
Labs:
Key topics covered: Machine Instructions, 32-bit Assembly, ELF Binary, IA-32 Instructions for
Pentesting, Binary Analysis Methodology, Capstone Framework, Static Analysis, Dynamic
Analysis, x86 C Program, Buffer Overflow, Heap Overflow, Memory Corruption Exploits, Cross-
Compile Binaries, Fuzzing, Fuzzing Steps, Types of Fizzers, Debugging, Fuzzing Tools, Building
Fuzzer
Labs:
Key topics covered: Lateral Movement, Pass the Hash (PtH) Attack, Pass the Ticket (PtT)
Attack, Kerberos Attacks, Silver Ticket, Golden Ticket, Kerberoasting, PsExec Metasploit
FrameWork for Lateral Movement, Windows Remote Management (WinRM) for Lateral
Movement, Crack RDP, Pivoting, Pivoting Tools, HTTP Tunneling, DNS Tunneling, ICMP
Tunneling, SSH Tunneling, Port Forwarding
Labs:
Key topics covered: IOT Penetration Testing, OWASP Top 10 IOT Threats, OWASP IOT Attack
Surface Areas, IOT Penetration Testing Methodology, Identify IOT Devices, Firmware Analysis,
Extract the Firmware Image, Firmware Extraction, Reverse Engineering Firmware, Static
Analysis of Binaries, Dynamic Analysis of Binaries, IOT Software Analysis, IOT Network and
Protocol Security Testing, Network Traffic Analysis Between Devices, Gateways, and Servers,
Privilege Escalation Techniques in IOT, Lateral Movement Techniques Within IOT Networks, IOT
Penetration Testing Report
Labs:
Key topics covered: Characteristics of a Good Pentesting Report, Report Components, Phases
of Report Development, Writing a Draft Report, Report Writing Tools, Delivering the Penetration
Testing Report, Report Retention, Destroying the Report, Sign-off Document, Developing and
Implementing Data Backup Plan, Conducting Training, Retesting and Validation
minimize course outline
The in-class schedule is currently unavailable. Check our online instructor-led schedule or leave your contact details to send you schedule updates.