The toughest Penetration Testing Exam on the Planet

Course Description

Years of research indicate that the majority of Pen Testing candidates have gaps in their skills when it comes to multiple disciplines. The metrics also prove when the targets are not located on the same or a directly connected and reachable segment, very few can perform as well as they do when it is direct and on a flat network.

That’s why, for the first time in the industry, the assessment for the Certified Penetration Tester (CPENT) is about multiple disciplines and not just one or two specialty types.

The CPENT range, which is where our penetration testers gain real-world skills is designed to provide challenges across every level of the attack spectrum. Additinally the range contains multiple layers of network segmentation, and once access is gained in one segment, the latest pivoting techniques are required to reach the next segment.

Outside-the-box thinking – Customization of scripts and exploits – environment dynamically changes based on technology changes – Progressive segments

Penetration Testers, Ethical Hackers, Information Security Consultant, Security Testers/Analysts/Engineers, Network Server Administrators, Firewall Administrators, System Administrators, Risk Assessment Professionals 

5 days
Minimum 40 hours

CPENT is a fully online, remotely proctored practical exam that challenges candidates through a grueling 24-hour performance-based, hands-on exam, categorized into two practical exams of 12-hours each, which will test your perseverance and fous by forcing you to outdo yourself with each new challenge. Candidates have the option to choose either two 12-hour exams or one 24-hour exam depending on how straining they would want the exam to be.


100% mapped with the NICE Framework

100% methodology based penetration testing program

Blended with both manual and automated penetration testing approach

Provides strong reporting writing guidance

Gives a real-world experience through an Advanced Penetration Testing Range

Offers standard templates that can help during a penetration test

Go beyond | Kali Automated tools Flat cyber ranges

Multiple discilpines

Presented through an accurate representation of an enterprise network environment that must be attacked, exploited, evaded and defended.

Advanced attacks

Windows attacks with Powershell (or other bypass techniques), as well as advanced methods to score points within zones.

IoT Security

Atudents attack IoT systems by locating and gaining access to the network and identifying the firmware of the IoT device.

Advanced environment and techniques

Such as penetration testing operational technology, double pivoting, evading defence mechanism, report writing, and professional dynamic reporting.

Program outline

► Introduction to Penetration Testing

► Penetration Testing Scoping and Engagement

► Open Source Intelligence (OSINT)

► Social Engineering Penetration Testing

► Network Penetraton Testing – External

► Network Penetraton Testing – Internal
► Network Penetraton Testing – Perimeter Devices
► Web Application Penetration Testing

► Wireless Penetration Testing

► IoT Penetration Testing

► OT/SCADA Penetration Testing

► Cloud Penetration Testing

► Binary Analysis and Exploitation

► Report writing and Post Testing Actions

► Appenix A: Penetration Testing Essential Concepts

► Appendix B: Fuzzing

► Appendix C: Mastering Metasploit Framework

► Appendix D: Powershell scripting

► Appendix E: Bash Environment and Scripting

► Appendix F: Python Environment and Scripting

► Appendix G: Perl Environment and Scripting

► Appendix H: Ruby Environment and Scripting

► Appendix I: Active Directory Pen Testing

► Appendix J: Databas Penetration Testing

► Appendix K: Mobile Device Penetraton Testing

Contact us!