Certified Penetration Testing Professional (CPENT)
Training elite dari EC-Council yang dirancang untuk menguji keterampilan penetration tester dalam menghadapi infrastruktur enterprise yang kompleks. Training ini membawa Anda ke level real-world pentest dengan skenario multi-layered, advanced pivoting, exploit development, hingga IoT dan OT security.
Ikuti Training Certified Penetration Testing Professional (CPENT)β
Program CPENT memberikan pengalaman langsung di cyber range yang realistis. Peserta akan diuji dalam menguasai end-to-end penetration testing, mulai dari perencanaan, eksploitasi, pivoting, hingga laporan profesional. Dengan standar industri internasional, CPENT memastikan Anda siap menghadapi tantangan dunia nyata sebagai elite penetration tester.
Simak Keuntungan Ikut Pelatihan di Temika Cyber
Hands-On Cyber Range
Lab dengan infrastruktur enterprise yang realistis, segmented network, pivoting, dan skenario real-world.
IoT & OT Security
Fokus pada keamanan perangkat IoT dan infrastruktur OT (Operational Technology).
Exploit Development Training
Belajar membuat exploit, reverse engineering, dan bypass proteksi modern.
Exam Preparation & Certification Path
Materi, strategi, dan simulasi ujian CPENT 24 jam.
Red Team Simulation
Simulasi serangan nyata yang menguji skill offensive dari awal hingga reporting.
Advanced Tools & Frameworks
Gunakan tools populer (Metasploit, Cobalt Strike, Burp Suite, dll.) plus framework NIST, MITRE ATT&CK.
Kenapa Harus Menguasai CPENT?
π Standar Tinggi Industri
CPENT diakui global sebagai benchmark keterampilan penetration tester tingkat lanjut.
π― Kombinasi Skill Pentest
Melatih exploit development, privilege escalation, hingga bypass keamanan tingkat lanjut.
πPeluang Karier Elite
Membuka akses ke posisi high-demand seperti senior pentester, red team lead, dan cyber consultant.
Jadwal Pelatihan
Pelatihan dimulai
Program Akan dilaksanakan secara: –
Periode Kelas: –
Estimasi Durasi Belajar: –
Tujuan Pelatihan
Setelah menyelesaikan kursus ini dengan sukses, peserta akan mampu:
Silabus
- 09:00 β 09:30: Welcome & Course Introduction
- Introductions and setting expectations.
- Overview of CPENT program and exam format (24-hour challenge).
- 09:30 β 10:45: Module 01 β Advanced Footprinting & OSINT
- Active vs. passive reconnaissance.
- Advanced OSINT collection with Maltego, Shodan, and Recon-ng.
- Hands-on Lab: Mapping enterprise targets using OSINT tools.
- 10:45 β 11:00: Morning Break
- 11:00 β 12:30: Module 02 β Network & Service Enumeration
- Scanning internal and external networks.
- Enumerating services, users, and applications.
- Hands-on Lab: Nmap and custom scanning scripts.
- 12:30 β 13:30: Lunch Break
- 13:30 β 15:00: Module 03 β Vulnerability Assessment
- Identifying and prioritizing vulnerabilities.
- Scanning with Nessus, OpenVAS, and custom scripts.
- Hands-on Lab: Vulnerability scanning in segmented networks.
- 15:00 β 15:15: Afternoon Break
- 15:15 β 16:45: Module 04 β Exploitation Basics
- Fundamentals of exploit development.
- Exploiting web apps and services.
- Hands-on Lab: Custom exploit execution.
- 16:45 β 17:00: Day 1 Wrap-up & Q&A
- 09:00 β 10:30: Module 05 β Windows Privilege Escalation
- Privilege escalation techniques in Windows.
- Bypassing UAC, exploiting misconfigurations.
- Hands-on Lab: Gaining SYSTEM privileges.
- 10:30 β 10:45: Morning Break
- 10:45 β 12:15: Module 06 β Linux Privilege Escalation
- Privilege escalation methods in Linux environments.
- Kernel exploits, SUID misconfigurations.
- Hands-on Lab: Exploiting Linux for root access.
- 12:15 β 13:15: Lunch Break
- 13:15 β 15:00: Module 07 β Exploit Development
- Buffer overflows and shellcode injection.
- Reverse engineering applications.
- Hands-on Lab: Writing and testing custom exploits.
- 15:00 β 15:15: Afternoon Break
- 15:15 β 16:45: Module 08 β Case Study: Exploit Chain Attack
- Simulated attack chaining multiple vulnerabilities.
- 16:45 β 17:00: Day 2 Wrap-up & Q&A
- 09:00 β 10:30: Module 09 β Pivoting Techniques
- Pivoting in segmented networks.
- SOCKS tunneling, SSH pivoting, proxy chains.
- Hands-on Lab: Moving laterally across networks.
- 10:30 β 10:45: Morning Break
- 10:45 β 12:15: Module 10 β Active Directory Exploitation
- Kerberoasting, Pass-the-Hash, and Golden Ticket attacks.
- Hands-on Lab: Exploiting AD for domain admin access.
- 12:15 β 13:15: Lunch Break
- 13:15 β 15:00: Module 11 β Cloud & Hybrid Attacks
- Attacking AWS, Azure, and hybrid networks.
- Hands-on Lab: Exploiting cloud misconfigurations.
- 15:00 β 15:15: Afternoon Break
- 15:15 β 16:45: Module 12 β Case Study: Multi-Layered Attack
- Simulating a full-scale enterprise breach.
- 16:45 β 17:00: Day 3 Wrap-up & Q&A
- 09:00 β 10:30: Module 13 β IoT Device Exploitation
- Exploiting IoT protocols and devices.
- Hands-on Lab: IoT firmware reverse engineering.
- 10:30 β 10:45: Morning Break
- 10:45 β 12:15: Module 14 β ICS/SCADA Security
- Industrial Control Systems attack vectors.
- Hands-on Lab: Simulated SCADA exploitation.
- 12:15 β 13:15: Lunch Break
- 13:15 β 15:00: Module 15 β Web & API Exploitation
- Advanced SQLi, RCE, SSRF, and API testing.
- Hands-on Lab: Exploiting APIs in enterprise applications.
- 15:00 β 15:15: Afternoon Break
- 15:15 β 16:45: Module 16 β Wireless & Mobile Attacks
- Attacking Wi-Fi, Bluetooth, and mobile apps.
- Hands-on Lab: Rogue AP and mobile exploitation.
- 16:45 β 17:00: Day 4 Wrap-up & Q&A
- 09:00 β 10:30: Module 17 β Red Teaming & Adversary Simulation
- End-to-end attack simulation and reporting to stakeholders.
- Hands-on Lab: Simulated red team operation.
- 10:30 β 10:45: Morning Break
- 10:45 β 12:15: Module 18 β Reporting & Documentation
- Professional penetration testing reports.
- Mapping findings to MITRE ATT&CK.
- 12:15 β 13:15: Lunch Break
- 13:15 β 15:00: Module 19 β CPENT Exam Strategies
- Exam structure and scoring methodology.
- Time management for 24-hour exam.
- 15:00 β 15:15: Afternoon Break
- 15:15 β 16:45: Module 20 β Mock Assessment & Q&A
- Practice exam and feedback session.
- 16:45 β 17:00: Course Wrap-up & Certification Guidance
Meet Your Expert
Trainer 1
Ethical Hacker
Trainer 2
Ethical Hacker
Apa Kata Mereka Tentang Pelatihan Ini
Sertifikasi Profesional Kami
Dapatkan Harga Spesial Selama Promo
Early Bird I
- Intensive Training (5 Days)
- Official EC-Council Exam Voucher
- Official Training Material (e-Courseware)
- Official iLabs Access
- Certificate of Attendance