CPENT: Certified Penetration Testing Professional Training




Per Participant

Course Description

You can learn everything you need to know about attacking, exploiting, dodging, and defending enterprise networks in the Certified Penetration Testing Professional (C|PENT) course.

If you have only worked in flat networks up until now, CPENT's live practice range will teach you how to take your skills to the next level by learning to pen test IoT systems and OT systems, write your own exploits and build your own tools, perform advanced binaries exploitation, double pivot into hidden networks, and modify scripts and exploits to get into the deepest parts of the network.


Who should attend this course?

  • Ethical Hackers
  • Penetration Testers
  • Network Server Administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and Risk
  • Assessment Professionals
  • Cybersecurity Forensic Analyst
  • Cyberthreat Analyst
  • Cloud Security Analyst
  • Information Security Analyst
  • Application Security Analyst
  • Cybersecurity Assurance Engineer
  • Security Operations Center (SOC) Analyst
  • Technical Operations Network Engineer
  • Information Security Engineer
  • Network Security Penetration Tester
  • Network Security Engineer
  • Information Security Architect


  • Virtual Live Training

Jun 19, 2023

9:00 am - 5:00 pm EST
  • Virtual Live Training

Jul 17, 2023

9:00 am - 5:00 pm EST
  • Virtual Live Training

Aug 21, 2023

9:00 am - 5:00 pm EST
  • Virtual Live Training

Sep 18, 2023

9:00 am - 5:00 pm EST
  • Virtual Live Training

Oct 16, 2023

9:00 am - 5:00 pm EST
  • Virtual Live Training

Nov 20, 2023

9:00 am - 5:00 pm EST
Request Batch

What you will learn

  • You will understand advanced Windows Attacks
  • You will access Hidden Networks with Pivoting
  • You will be able to locate Attacking IOT Systems
  • It will give you access hidden networks using double pivoting
  • You will understand latest methods of privilege escalation reverse engineering code to take control of execution then break out of the limited shell are required to gain root/admin
  • You will be able to testing by different defenses you are likely to see in the wild
  • You will be able to compromise and then extract the required data from the web apps to achieve points
  • You will be prepare for advanced penetration testing techniques and scripting
  • You will be able to build your armory with your coding expertise to hack the challenges.


Cover the fundamentals of penetration testing, including penetration testing approaches, strategies, methodologies, techniques, and various guidelines and recommendations for penetration testing.

Learn the different stages and elements of scoping and engagement in penetration testing.

Learn how to use techniques and tools to gather intelligence about the target from publicly available sources such as the World Wide Web (WWW), through website analysis, by using tools/frameworks/scripts, and so on.

Learn different social engineering techniques and perform socialengineering penetration testing on a target organization.

Learn how to implement a comprehensive penetration testing methodology for assessing networks from outsiders’ perspectives. Learn the process attackers follow to exploit the assets using vulnerabilities from the outside of the network perimeter.

Learn how to implement a comprehensive penetration testing methodology for assessing networks from insider’s perspectives.

Learn how to implement a comprehensive penetration testing methodology for assessing the security of network perimeter devices, such as Firewalls, IDS, Routers, and Switches.

Learn how to analyze web applications for various vulnerabilities, including the Open Web Application Security Project (OWASP) Top 10, and determine the risk of exploitation.

Learn how to test various components of wireless networks, such as WLAN, RFID devices, and NFC technology devices.

Understand various threats to Internet of things (IoT) networks and learn how to audit security controls for various inherent IoT risks.

Understand OT and SCADA concepts and learn the process of testing various components of OT and SCADA networks.

Understand various security threats and concerns in cloud computing and learn how to perform cloud penetration testing to determine the probability of exploitation.

Understand the binary analysis methodology and reverse engineer applications to identify vulnerable applications that may lead to the exploitation of an information system.

Learn how to document and analyze the results of a penetration test and recommend post-penetration test actions.

With Microtek Learning, you’ll receive:

  • Certified Instructor-led training
  • Industry Best Trainers
  • Official Training Course Student Handbook
  • Pre and Post assessments/evaluations
  • Collaboration with classmates (not available for a self-paced course)
  • Real-world knowledge activities and scenarios
  • Exam scheduling support*
  • Learn and earn program*
  • Practice Tests
  • Knowledge acquisition and exam-oriented
  • Interactive online course.
  • Support from an approved expert
  • For Government and Private pricing*

* For more details call: +1-800-961-0337 or Email: info@microteklearning.com

Request Call

Our Clients

For many years, Microtek Learning has been helping organizations, leaders, and professionals to reach their maximum performance by addressing the challenges they are facing.

  • 300+ enterprise clients
  • 100,000+ professionals trained
  • Service 70 of the Fortune 100
  • 96% of our clients would recommend us
our clients

Our Awards

our awards
why choose us



I was sceptical at first whether to enrol with Microtek Learning or not, however, I am glad that I did- I got everything that was promised (maybe more). The trainer was very patient and knowledgeable and with his effort and mine, I was able to clear the exam with ease! Keep up the good work everyone.



  • (5)

I'm really impressed with the storytelling skills of the instructor. She makes the session exciting by keeping things simple and easy to understand.

Prince N.


  • (5)

I was recommended the ITIL 4 Foundation course by an IT professional who had completed the same course at Microtek Learning. The training gave me a thorough understanding of service management that I felt I could take back to my job as an IT Project Management and apply it to improve the value of products and services.

Marsh George


  • (5)
Accredited By

Course Details

  • Start Date: Jun 19, 2023
  • Duration: 5 Days
  • Enrolled: 2145
  • Price: $2999
  • Course PDF: Click Here
side post side mode

Talk to Learning Advisor