
CPENT eBook w/ iLabs (Volumes 1 through 4)
Important Discount Information: Extensive discounts are offered through the EC-Council Academia partner program to students and faculty within the network. In result, this item is available at the following rate to qualified students: $417.50 For more information, please visit www.eccouncil.org/academia. Thank you! ___ Access the authorized lab and eBook resources for Certified Penetration Testing Professional (CPENT), developed and authored by EC-Council! (www.eccouncil.org) This license will provide you with 6 months access to EC-Council's exclusive iLabs portal (access starts post code redemption), and 12 months access to CPENTv1 Volumes 1 through 4 via Vital Source. Practice your skills, refine your skills, follow the instructions, or go outside of the instructions. These are NOT simulations and this is one range you will never break! (Average Time for Course Completion: 10 Hours) CPENTv1 - Volumes 1 through 4 Course Outline: Introduction to Penetration Testing and Methodologies *NO LAB OFFERED Penetration Testing Scoping and Engagement Methodology Report Writing and Post Testing Actions Open Source Intelligence (OSINT) Methodology Social Engineering Penetration Testing Methodology Web Application Penetration Testing Methodology *NO LAB OFFERED Binary Analysis and Exploitation *NO LAB OFFERED Network Penetration Testing Methodology – External Network Penetration Testing Methodology – Internal Network Penetration Testing Methodology - Perimeter Devices Wireless Penetration Testing Methodology *NO LAB OFFERED IoT Penetration Testing Methodology OT/SCADA Penetration Testing Methodology Cloud Penetration Testing Methodology Appendix *NO LAB OFFERED Appendix B – Fuzzing Appendix C – Mastering Metasploit Framework Appendix D – PowerShell Scripting Appendix E – Bash Environment and Scripting Appendix F – Python Environment and Scripting Appendix G – Perl Environment and Scripting Appendix H – Ruby Environment and Scripting Appendix I – Active Directory Penetration Testing Appendix J – Database Penetration Testing Appendix K – Mobile Device Penetration Testing