Certified Penetration Testing Professional (CPENT) (Voucher Included)

The EC-Council's Certified Penetration Tester (CPENT) program is an engaging, informative, and expertly designed course that aims to help you master your Penetration Testing (pen-testing) skills. Recognized by the American Council on Education (ACE), this penetrating testing course offers a comprehensive curriculum that encompasses innovative techniques and methodologies for tackling real-world threat scenarios.

In this penetration testing certification course, you will gain an understanding of...

SHARE
9 Months / 200 Course Hrs
Open Enrollment
Offered in partnership with your preferred school

Butler Community College

Change School
Learning method

for additional information

Certified Penetration Testing Professional (CPENT) (Voucher Included)

Enroll Now

Course code: GES3040

What you will learn

  • Advanced Windows Attacks
  • Attacking IOT Systems
  • Writing Exploits: Advanced Binary Exploitation
  • Bypassing a Filtered Network
  • Pen testing Operational Technology (OT)
  • Access Hidden Networks with Pivoting
  • Double Pivoting
  • Privilege Escalation
  • Evading Defense Mechanisms
  • Attack Automation with Scripts
  • Weaponize Your Exploits
  • Write Professional Reports

How you will benefit

  • Mapped with the NICE framework.
  • 100% methodology-based penetration testing program
  • Blends both manual and automated penetration testing approaches
  • Designed with the best service providers' most common penetration testing practices
  • Maps to all major Job Portals. Role Title: Penetration Tester and Security Analyst
  • Provides strong reporting writing guidance
  • Gives a real-world experience through an Advanced Penetration Testing Range
  • Provides candidates with standard Pen test for use in the field

How the course is taught

  • Self-paced, online course
  • 9 Months to complete
  • Open enrollment, begin anytime
  • 200 course hours
  1. Introduction to Penetration Testing
  2. Penetration Testing Scoping and Engagement
  3. Open-Source Intelligence (OSINT)
  4. Social Engineering Penetration Testing
  5. Network Penetration Testing – External
  6. Network Penetration Testing– Internal
  7. Network Penetration Testing – Perimeter Devices
  8. Web Application Penetration Testing
  9. Wireless Penetration Testing
  10. IoT Penetration Testing
  11. OT/SCADA Penetration Testing
  12. Cloud Penetration Testing
  13. Binary Analysis and Exploitation
  14. Active Directory Penetration Testing
  15. Report Writing and Post Testing Actions

Kevin Cardwell

Kevin Cardwell is an experienced instructor, technical editor, and author for computer forensics and hacking courses. He has conducted over 500 security assessments across the globe with expertise in finding weaknesses and determining ways clients can mitigate or limit the impact of these weaknesses.

Kevin currently works as a freelance consultant and provides consulting services for companies throughout the world, and as an advisor to numerous government entities within the U.S., Middle East, Africa, Asia, and the U.K. He previously spent 22 years in the U.S. Navy and worked as both a software and systems engineer on a variety of Department of Defense projects.

Kevin is the author of the Center for Advanced Security and Training (CAST) Advanced Network Defense and Advanced Penetration Testing courses and Building Virtual Pentesting Labs for Advanced Penetration Testing, Advanced Penetration Testing for Highly Secured Environments 2nd Edition and Backtrack: Testing Wireless Network Security. He is technical editor of the Learning Tree Course Penetration Testing Techniques and Computer Forensics. He has also presented at the Blackhat USA, Hacker Halted, ISSA, and TakeDownCon conferences, and more.

Kevin received his Bachelor of Science in computer science from the National University in California and a Master of Science in software engineering from Southern Methodist University (SMU) in Texas. He holds the CEH, ECSA, LPT, and several other certifications.

Prerequisites:

We strongly recommend candidates to complete the Certified Ethical Hacker prior to attempting the CPENT course.

Requirements:

Hardware Requirements:

  • This course can be taken on either a PC, Mac, or Chromebook.

Software Requirements:

  • PC: Windows 7 or later.
  • Mac: macOS 10.12 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Adobe Acrobat Reader
  • Software must be installed and fully operational before the course begins.

Other:

  • Email capabilities and access to a personal email account.

Instructional Material Requirements:

The instructional materials required for this course are included in enrollment and will be available online.

About Certification: International Council of E-Commerce Consultants

EC Council stands for International Council of E-Commerce Consultants, the world's largest certifying body dedicated to cybersecurity. EC Council offers certification programs in many other facets of the field, including the Certified Ethical Hacker exam, which is nationally recognized for its comprehensive and modern material.

EC Council has earned accolades from the U.S. Government's National Security Agency (NSA) and accreditation from the American National Standards Institute (ANSI). With such an excellent reputation, it's easy to see why enrolling in a course certified by EC Council will do wonders for your career.

A penetration tester simulates a real-world attack on a target system and identifies any weaknesses an attacker could exploit. The results are then used to improve the target system's security.

According to Indeed, the average salary of a penetration tester is $119,281.

Penetration testing, also known as pen testing, is a technique that helps identify vulnerabilities and assess an organization's compliance, employee awareness of security protocols, and incident response plans. By simulating cyber-attacks, pen testing provides valuable insights into an organization's security controls, identifies vulnerabilities and their level of risk, and recommends prioritized remediation steps through professional reporting, documentation, and communication.

Penetration testing can be a vital component for many different IT security-related roles, including:

  • Ethical Hackers
  • Penetration Testers
  • Network Server Administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and Risk Assessment professionals
  • Cybersecurity Forensic Analyst
  • Cyberthreat Analyst
  • Cloud Security Analyst
  • Information Security Analyst and Architect
  • Application Security Analyst
  • Cybersecurity Assurance Engineer
  • Security Operations Center (SOC) Analyst
  • Technical Operations Network Engineer
  • Information Security Engineer
  • Network Security Penetration Tester and Engineer

EC-Council's Certified Penetration Testing Professional (CPENT) program is an expert-designed, multi-disciplinary course that builds expertise in advanced penetration testing tools, techniques, and methodologies.

Yes, students will be prepared to sit for the Certified Penetration Testing Professional (CPENT) exam 412-80 offered by EC-Council.

This course is open enrollment, so you can register and start the course whenever you are ready. Access to your course can take 24-48 business hours.

After you register, you will receive 9 months to complete the course. The time allotted for completion has been calculated based on the number of course hours.

The time allotted for course completion has been calculated based on the number of course hours. However, if you are unable to complete the course, contact the student advising team to see what options you may have available to work out a suitable completion date. Please note that an extension fee may be charged.

Our courses are designed to accommodate various learning preferences. Depending on the course structure, you may get different forms of support. Self-paced courses are designed to be user-friendly and independent, minimizing the need for external support. In courses with instructors, our direct platform support feature includes opportunities for questions, discussions, and remediation, with email and phone support available for select courses. Our student advising team is available to guide you on program requirements and administrative requests, but they do not provide assistance with course content. Our goal is to provide you with the necessary support for success, whether it's through self-paced exploration, direct communication, or guidance from our advising team.

Upon successfully passing the final exam, you will be awarded a certificate of completion from the school or organization that you registered through.

ed2go courses will help you gain the skills you need to obtain an entry-level position in most cases. However, you should always research the job market in your area before enrolling.

ed2go courses are non-credit, so they do not qualify for federal aid, FAFSA, and Pell Grant. In some states, vocational rehab or workforce development boards may provide funding to take our courses. Additionally, you may qualify for financial assistance if you meet certain requirements. Learn more about financial assistance.

If you have questions that are not answered on our website, representatives are available via LIVE chat. You can also call us at 1-877-221-5151 during regular business hours to have your questions promptly answered. If you are visiting us during non-business hours, please send us a question using the "Contact Us."