Certified Penetration Testing Professional (C|PENT)

Professional Pentesting Course with International Certification

C|PENT is a rigorous penetration testing program that teaches multidisciplinary skills to perform effective tests in filtered networks. The course provides hands-on training in advanced attacks on Windows systems, IoT, OT, privilege escalation, binary exploitation, pivoting, and more. It is desi…

40 hours
Official Certificate
Expert Instructors
Online Learning
Certificación internacional Penetration Testing Professional (C|PENT)
EC-COUNCIL logo

C|PENT is a rigorous penetration testing program that teaches multidisciplinary skills to perform effective tests in filtered networks. The course provides hands-on training in advanced attacks on Windows systems, IoT, OT, privilege escalation, binary exploitation, pivoting, and more.

It is designed to simulate real enterprise environments with multiple network segments, offering complex and progressively challenging scenarios.

At the end of the course, participants will be able to:

  • • Navigate and compromise segmented and filtered networks
  • • Apply techniques such as pivoting, double pivoting, evasion, and privilege escalation
  • • Reverse-engineer binaries, exploit vulnerabilities, and write professional penetration test reports
  • • Use both automated and manual tools with a practical, hands-on approach

To fully benefit from the course, participants are required to have:

  • • Prior knowledge of penetration testing
  • • Basic experience with networking, operating systems, and pentesting tools
  • • It is recommended to have completed CEH or an equivalent certification

Certificación internacional Penetration Testing Professional (C|PENT) Applies
Certificación internacional Penetration Testing Professional (C|PENT) 40 hours

Learning Methodology

The learning methodology, regardless of the modality (in-person or remote), is based on the development of workshops or labs that lead to the construction of a project, emulating real activities in a company.

The instructor (live), a professional with extensive experience in work environments related to the topics covered, acts as a workshop leader, guiding students' practice through knowledge transfer processes, applying the concepts of the proposed syllabus to the project.

The methodology seeks that the student does not memorize, but rather understands the concepts and how they are applied in a work environment.

As a result of this work, at the end of the training the student will have gained real experience, will be prepared for work and to pass an interview, a technical test, and/or achieve higher scores on international certification exams.

Conditions to guarantee successful results:
  • a. An institution that requires the application of the model through organization, logistics, and strict control over the activities to be carried out by the participants in each training session.
  • b. An instructor located anywhere in the world, who has the required in-depth knowledge, expertise, experience, and outstanding values, ensuring a very high-level knowledge transfer.
  • c. A committed student, with the space, time, and attention required by the training process, and the willingness to focus on understanding how concepts are applied in a work environment, and not memorizing concepts just to take an exam.

Pre-enrollment

You do not need to pay to pre-enroll. By pre-enrolling, you reserve a spot in the group for this course or program. Our team will contact you to complete your enrollment.

Pre-enroll now

Infinity Payments

Make your payment quickly, safely and reliably


- For bank transfer payments, request the details by email capacita@aulamatriz.edu.co.

- If you wish to finance your payment through our credit options
(Sufi, Cooperativa Unimos or Fincomercio), click on the following link:
Ver opciones de crédito.

To continue you must
Or if you don't have an account you must

Description

C|PENT is a rigorous penetration testing program that teaches multidisciplinary skills to perform effective tests in filtered networks. The course provides hands-on training in advanced attacks on Windows systems, IoT, OT, privilege escalation, binary exploitation, pivoting, and more.

It is designed to simulate real enterprise environments with multiple network segments, offering complex and progressively challenging scenarios.

Objectives

At the end of the course, participants will be able to:

  • • Navigate and compromise segmented and filtered networks
  • • Apply techniques such as pivoting, double pivoting, evasion, and privilege escalation
  • • Reverse-engineer binaries, exploit vulnerabilities, and write professional penetration test reports
  • • Use both automated and manual tools with a practical, hands-on approach

To fully benefit from the course, participants are required to have:

  • • Prior knowledge of penetration testing
  • • Basic experience with networking, operating systems, and pentesting tools
  • • It is recommended to have completed CEH or an equivalent certification

offers

Certificación internacional Penetration Testing Professional (C|PENT) Applies
Certificación internacional Penetration Testing Professional (C|PENT) 40 hours

Learning Methodology

The learning methodology, regardless of the modality (in-person or remote), is based on the development of workshops or labs that lead to the construction of a project, emulating real activities in a company.

The instructor(live), a professional with extensive experience in work environments related to the topics covered, acts as a workshop leader, guiding students' practice through knowledge transfer processes, applying the concepts of the proposed syllabus to the project.

La metodología persigue que el estudiante "does not memorize", but rather "understands" the concepts and how they are applied in a work environment."

As a result of this work, at the end of the training the student will have gained real experience, will be prepared for work and to pass an interview, a technical test, and/or achieve higher scores on international certification exams.

Conditions to guarantee successful results:
  • a. An institution that requires the application of the model through organization, logistics, and strict control over the activities to be carried out by the participants in each training session.
  • b. An instructor located anywhere in the world, who has the required in-depth knowledge, expertise, experience, and outstanding values, ensuring a very high-level knowledge transfer.
  • c. A committed student, with the space, time, and attention required by the training process, and the willingness to focus on understanding how concepts are applied in a work environment, and not memorizing concepts just to take an exam.

Course Modules

1. Introduction to Pentesting

It presents the fundamental principles, ethical framework, methodologies, and phases that govern a professional penetration test, as well as the regulations and best practices of the industry.

Explains how to establish the boundaries of the exercise, confidentiality agreements, legal authorizations, and the necessary documentation to initiate an ethical test.

Covers techniques for collecting useful information from open sources (Open Source Intelligence), such as search engines, social networks, DNS, WHOIS, and public databases.

Teaches how to assess the human link through phishing emails, physical attacks, and simulated campaigns to measure security awareness.

It focuses on identifying and exploiting vulnerabilities in systems exposed to the Internet, including servers, remote services, and misconfigured networks.

Simulates attacks from within the corporate network. Teaches enumeration techniques, lateral movement, and privilege escalation within the internal environment.

Explore how to attack perimeter devices such as routers, firewalls, and VPNs, and how to compromise them to access internal networks.

Includes SQL injection testing, XSS, CSRF, file inclusion, and other attack techniques on modern websites and web applications.

Covers attacks on Wi-Fi networks, such as cracking WEP/WPA keys, rogue APs, packet sniffing, and deauthentication attacks.

It addresses the analysis of smart devices, access to firmware, UART ports, specific protocols, and common vulnerabilities in the IoT ecosystem.

Train in the evaluation of industrial control systems, including protocols such as Modbus and DNP3, attacks on PLCs, and risks in industrial environments.

Provides practice on techniques for auditing cloud environments (AWS, Azure, GCP), exploiting insecure configurations, exposed credentials, and poorly managed permissions.

Teaches advanced exploitation at the operating system level, including buffer overflows, format string vulnerabilities, heap overflows, and modern evasion techniques.

Guide to structuring a professional pentesting report, presenting findings, risks, technical evidence, and clear executive recommendations.