• Home
  • Courses
    • Executive Management

      Certified Chief Information Security Officer (CCISO)

      Risk Management Approach and Practices (RM)

      Ethical Hacking

      Certified Ethical Hacker (CEH)

      Ethical Hacking Core Skills (EHCS)

      Network Security

      Certified Cybersecurity Technician (CCT)

      Certified Network Defender (CND)

      ICS/SCADA Cybersecurity

      Computer Forensics

      Computer Hacking Forensic Investigator (CHFI)

      Dark Web Forensics

      Malware and Memory Forensics

      Mobile Forensics

      Incident Handling

      Certified Incident Handler (ECIH)

      Certified SOC Analyst (CSA)

      Certified Threat Intelligence Analyst (CTIA)

      Encryption

      Certified Encryption Specialist (ECES)

      Pen Testing

      Certified Penetration Testing Professional (CPENT)

      Web Application | Hacking & Security

      Application Security

      Certified Application Security Engineer (CASE .NET)

      Certified Application Security Engineer (CASE Java)

      EC-Council Certified DevSecOps Engineer (ECDE)

      IT Project Management

      Certified Project Management (CPM)

      Cloud Security

      Certified Cloud Security Engineer (CCSE)

      AI Pro Suite

      AI Essentials

      Certified AI Program Manager (CAIPM)

      Certified Responsible AI Governance & Ethics (CRAGE)

      Certified Offensive AI Security Professional (COASP)

      Fundamentals

      Certified Secure Computer User (CSCU)

      Ethical Hacking Essentials

      Network Defense Essentials

      Digital Forensics Essentials

      EC-Council IoT Security Essentials

      EC-Council SOC Essentials

      EC-Council Threat Intelligence Essentials

      Cloud Security Essentials

      EC-Council DevSecOps Essentials

      AI Essentials

  • Training
    • Live Course Schedule
      • North America
    • Learning Options
    • Financing Options
    • First Look Series
    • Career Training Paths
    • Resources
      • Whitepapers
  • Security Channel
  • About
  • Store
    • Mobile Security Toolkit
    • Textbooks
    • T-Shirts & Merch
  • Contact Us
  • My Account
Search
START TYPING AND PRESS ENTER TO SEARCH
My cart

No products in the cart.

  • Home
  • Courses
    • Executive Management

      Certified Chief Information Security Officer (CCISO)

      Risk Management Approach and Practices (RM)

      Ethical Hacking

      Certified Ethical Hacker (CEH)

      Ethical Hacking Core Skills (EHCS)

      Network Security

      Certified Cybersecurity Technician (CCT)

      Certified Network Defender (CND)

      ICS/SCADA Cybersecurity

      Computer Forensics

      Computer Hacking Forensic Investigator (CHFI)

      Dark Web Forensics

      Malware and Memory Forensics

      Mobile Forensics

      Incident Handling

      Certified Incident Handler (ECIH)

      Certified SOC Analyst (CSA)

      Certified Threat Intelligence Analyst (CTIA)

      Encryption

      Certified Encryption Specialist (ECES)

      Pen Testing

      Certified Penetration Testing Professional (CPENT)

      Web Application | Hacking & Security

      Application Security

      Certified Application Security Engineer (CASE .NET)

      Certified Application Security Engineer (CASE Java)

      EC-Council Certified DevSecOps Engineer (ECDE)

      IT Project Management

      Certified Project Management (CPM)

      Cloud Security

      Certified Cloud Security Engineer (CCSE)

      AI Pro Suite

      AI Essentials

      Certified AI Program Manager (CAIPM)

      Certified Responsible AI Governance & Ethics (CRAGE)

      Certified Offensive AI Security Professional (COASP)

      Fundamentals

      Certified Secure Computer User (CSCU)

      Ethical Hacking Essentials

      Network Defense Essentials

      Digital Forensics Essentials

      EC-Council IoT Security Essentials

      EC-Council SOC Essentials

      EC-Council Threat Intelligence Essentials

      Cloud Security Essentials

      EC-Council DevSecOps Essentials

      AI Essentials

  • Training
    • Live Course Schedule
      • North America
    • Learning Options
    • Financing Options
    • First Look Series
    • Career Training Paths
    • Resources
      • Whitepapers
  • Security Channel
  • About
  • Store
    • Mobile Security Toolkit
    • Textbooks
    • T-Shirts & Merch
  • Contact Us
  • My Account
Search
My cart
EC-Council Learning
Home / Course / Certified Penetration Tester (CPENT)

Certified Penetration Tester (CPENT)

Learn more about this course
Categories: Uncategorized
  Course Navigation
CPENT | Module 01: Introduction to Penetration Testing and Methodologies
CPENT | Module 02: Penetration Testing Scoping and Engagement
CPENT | Module 03: Open Source Intelligence (OSINT)
  • CPENT | Module 3: Performing Information Gathering on a Target Organization using OSINT Framework
  • CPENT | Module 03: Footprinting a Target using Maltego
CPENT | Module 04: Social Engineering Penetration Testing
  • CPENT | Module 04 Lab: Conducting a Phishing Campaign Using Social Engineering Toolkit
  • CPENT | Module 04 Lab: Conducting a Phishing Campaign Using OhPhish
CPENT | Module 05: Network Penetration Testing
  • CPENT | Module 05 Lab: Exploring and Auditing a Machine Using Nmap
  • CPENT | Module 05 Lab: Accessing Misconfigured FTP Connection on a Remote Machine
  • CPENT | Module 05 Lab: Enumerate a WordPress Site
  • CPENT | Module 05 Lab: Perform Web Application Scanning with WMAP
CPENT | Module 06: Network Penetration Testing
  • CPENT | Module 06 Lab: Scanning with Netdiscover
  • CPENT | Module 06 Lab: Scanning and Scripting with hping3
  • CPENT | Module 06 Lab: Scanning and Building a Target Database
  • CPENT | Module 06 Lab: Using Workspaces and db_nmap
  • CPENT | Module 06 Lab: Performing Passive OS Fingerprinting to Obtain Remote Operating System Information
  • CPENT | Module 06 Lab: OS Fingerprinting with Nmap
  • CPENT | Module 06 Lab: Scanning with DMitry
  • CPENT | Module 06 Lab: Create a Python Script to Grab the Banner of the ssh Service
  • CPENT | Module 06 Lab: Use Metasploit to Detect Version of HTTP
  • CPENT | Module 06 Lab: Enumerating SMB
  • CPENT | Module 06 Lab: Pentesting Misconfigured RPC Service and NFS Shares
  • CPENT | Module 06 Lab: Enumerating Logged on Users Using Finger Protocol
  • CPENT | Module 06 Lab: Performing Man-in-the-Middle Attack using Cain & Abel
  • CPENT | Module 06 Lab: Auditing a Machine for Weak Passwords Using L0phtCrack
  • CPENT | Module 06 Lab: Automating Penetration Testing Tasks Using Bash Scripting
  • CPENT | Module 06 Lab: Vulnerability Analysis with OpenVAS
  • CPENT | Module 06 Lab: Search for Exploits using Searchsploit
  • CPENT | Module 06 Lab: Adding an Exploit to Metasploit
  • CPENT | MODULE 06 LAB: Exploiting Windows OS Vulnerability
  • CPENT | Module 06 Lab: Exploiting and Escalating Privileges on a Windows Operating System
  • CPENT | Module 06 Lab: Penetration Testing Buffer Overflow Vulnerability on a Windows Application
  • CPENT | Module 06 Lab: Exploiting and Escalating Privileges on a Linux Operating System
  • CPENT | Module 06 Lab: Penetration Testing Vulnerable Machines and Creating a Botnet
CPENT | Module 07: Network Penetration Testing - Perimeter Devices
  • CPENT | Module 07 Lab: Scanning with Nmap against Defenses
  • CPENT | Module 07 Lab: Identifying and Bypassing a Firewall
  • CPENT | Module 07 Lab: HTTP Tunneling to Bypass Firewalls Using HTTPort
  • CPENT | Module 07 Lab : Evasion Using Social-Engineer Toolkit (SET)
  • CPENT | Module 07 Lab: Proxychains
  • CPENT | Module 07 Lab: Pivoting
CPENT | Module 08: Web Application Penetration Testing
  • CPENT | Module 8 Lab: Gathering Information About a Target Using WhatWeb
  • CPENT | Module 08 Lab: Web Application Vulnerability Assessment Using Vega
  • CPENT | Module 08 Lab: Pentesting Identified Web Applications Vulnerabilities
  • CPENT | Module 08 Lab: Pentesting Web Application for Stored XSS and Parameter Manipulation Vulnerabilities
  • CPENT | Module 08 Lab: Exploiting Directory Traversal Vulnerability in WordPress Application
  • CPENT | Module 08 Lab: Performing Dictionary Attack on a WordPress Web Application using Burp Suite
  • CPENT | Module 08 Lab: Exploiting WordPress Web Application Vulnerability by Uploading a Customized Shell
  • CPENT | Module 08 Lab: Directory Browsing a WordPress Website using DirBuster and Accessing Shell
CPENT | Module 09: Wireless Penetration Testing
CPENT | Module 10: IoT Penetration Testing
  • CPENT | Module 10 Lab: IOT Firmware Acquisition, Extraction, Analysis and Emulation
CPENT | Module 11: OT and SCADA Penetration Testing
  • CPENT | Module 11 Lab: ModBus Protocol Analysis – I
  • CPENT | Module 11 Lab: ModBus Protocol Analysis – II
CPENT | Module 12: Cloud Penetration Testing
CPENT | Module 13: Binary Analysis and Exploitation
  • CPENT | Module 13 Lab: Binary Analysis
  • CPENT | Module 13 Lab: Binary Analysis on a 64-bit Machine
  • CPENT | Module 13 Lab: Binary Analysis Methodology
  • CPENT | Module 13 Lab: Advanced Binary Analysis
  • CPENT | Module 13 Lab: 32-bit Buffer Overflow
  • CPENT | Module 13 Lab: Libc Exploit To Bypass No Execute Stack
  • CPENT | Module 13 Lab: 64-bit Exploitation
  • CPENT | Module 13 Lab: ROP Fundamental Exploitation
  • CPENT | Module 13 Lab: Linux Kernel ROP and ropgadget
CPENT | Module 14: Report Writing and Post Testing Actions
  • CPENT | Module 14 Lab: Generating Penetration Test Reports and Documenting all of them to KeepNote
  • CPENT | Module 14 Lab: Generating Penetration Test Reports and Documenting all of them to Dradis
CPENT | Deep Dive
CPENT | Appendix A: Penetration Testing Essential Concepts
CPENT | Appendix B: Fuzzing
  • CPENT | Appendix B Lab 01: Fuzzing with zzuf
  • CPENT | Appendix B Lab 02: Address Sanitizer
  • CPENT | Appendix B Lab 03: Fuzzing with afl
  • CPENT | Appendix B Lab 04: Fuzzing with afl and capstone
  • CPENT | Appendix B 05: Additional Capabilities of Address Sanitizer
CPENT | Appendix C: Mastering Metasploit Framework
  • CPENT | Appendix C Lab 01: Exploring the Metasploit Framework
CPENT | Appendix D: PowerShell Scripting
  • CPENT | Appendix D Lab 01: Exploring the PowerShell Environment
  • CPENT | Appendix D Lab 02: Leveraging Powershell
  • CPENT | Appendix D Lab 03: Attempting Powershell Execution Bypass
CPENT | Appendix E: Bash Environment and Scripting
  • CPENT | Appendix E Lab 01: Basic BASH Queries
« ‹ › » page 1 / 2
© EC-Council iClass
Privacy Policy
  • My Account
  • Search
  • Cart 0
adroll_adv_id = "45CU7M3DZFD43HW3NPCGBP"; adroll_pix_id = "4HOS7ZC375GANE7LQGELYY"; adroll_version = "2.0"; adroll_current_page = "other"; adroll_currency = "USD"; adroll_language = "en_US";
No thumbnail
Uploaded
Failed
Remove uploaded file

Save your cart?

x