Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
- MODULE 01: Introduction to Penetration Testing for Government
- MODULE 02: Scoping and Engagement in Penetration Testing for Government
- MODULE 03: Open Source Intelligence (OSINT) for Government
- MODULE 04: Social Engineering Penetration Testing for Government
- MODULE 05: External Network Penetration Testing for Government
- MODULE 06: Internal Network Penetration Testing for Government
- MODULE 07: Perimeter Device Penetration Testing for Government
- MODULE 08: Web Application Penetration Testing for Government
- MODULE 09: Wireless Penetration Testing for Government
- MODULE 10: Internet of Things (IoT) Penetration Testing for Government
- MODULE 11: Operational Technology/Supervisory Control and Data Acquisition (OT/SCADA) Penetration Testing for Government
- MODULE 12: Cloud Penetration Testing for Government
- MODULE 13: Binary Analysis and Exploitation for Government
- MODULE 14: Report Writing and Post-Testing Actions for Government
Requirements
To be eligible for the CPENT training, learners must possess:
- At least 5 to 7 years of professional IT experience.
- Practical experience with major web and mobile technologies.
- A solid understanding of TCP/IP, firewalls, and encryption.
- Experience with enterprise-level operating systems and databases.
- Familiarity with application and web development tools, such as Python, HTML, JavaScript, and SQL.
- Knowledge of networking principles, including subnetting, routing, and remote access services.
- Understanding of information security practices and controls, such as access control, authentication, and cryptography.
- Proficiency with penetration testing tools and technologies.
- The ability to think creatively to develop innovative solutions to security challenges.
These criteria are designed to ensure that participants have the necessary background and skills for government IT environments.
35 Hours
Testimonials (2)
The really lot of extra tools that was mentioned and the real life examples form Mane's experience.
Tamas Adam - Ericsson
Course - Certified Ethical Hacker CEH v.13 AI
Instructor delivery of information; At the end of the day it was Gaurav who pulled off this topic focusing on building strong fundamentals and devising a methodology to be retained with us