Access Training
for Customers/Partners
Access Training
for NetWitness Employees
$3,499 USD
3,499 Training Credits
Overview
The ECCAPT consists of entire network segments that replicate an enterprise network — this is not a computer game simulation, this is an accurate representation of an enterprise network that will present the latest challenges Licensed Penetration Tester (Master) Licensed Penetration Tester (Master) to the pen tester. Since the targets and technology continue to change, the ECCAPT is dynamic and machines and defenses will be added as they are observed in the wild. Finally, the targets and segments are progressive in nature, once you get into one machine and or segment, the next one will challenge you even more.
Finally, the ranges are designed to teach professional-level skills to identify the attack surface of targets within a required time frame and, once this has been accomplished, to gain access to the machines and escalate privileges as required. The greater the variety of targets you encounter with and without defenses, the better of a professional penetration tester you will become. The practical environment ranges progress in difficulty and reflect real enterprise network architecture. This environment includes defenses and challenges which you must defeat and overcome.
This training format has helped thousands of penetration testers globally and is proven to be effective. Everything presented in the course is through an enterprise network environment that must be attacked, exploited, evaded, and defended.
The MasterClass Package Includes:
- Certified Penetration Testing Professional (CPENT):
- Certified Penetration Testing Professional (CPENT) Live Course
- CPENT Printed Courseware (US courses Only)
- CPENT Practice Range (90 days access)
- CPENT Certification Exam
- Exam Insurance Program
- CPENT Online Self-Paced Streaming Video (1 year access)
Why MasterClass?:
The Most Robust
The MasterClass Penetration Tester program includes three courses with the potential to earn two certifications:
- Students will attend the live Certified Penetration Testing Professional (CPENT) Pen-Test Course which will teach a structured, methodological approach on how to use the tools taught in the Certified Ethical Hacker (CEH) course in a real world pen test scenario.
- The Next step will be to apply the concepts taught in the CPENT course against the practice range. Finally student will challenge the CPENT certification exam on the live CPENT exam cyberrange.
- Those who earn 70% or better will earn their CPENT certification but those who earn 90% or better earns the License Penetration Tester Master (LPT) credential.
The Most Practice Ranges
The CPENT range consists of entire network segments that replicate an enterprise network — this is not a computer game simulation; this is an accurate representation of an enterprise network that will present the latest challenges to the pen tester. The benefit of hands on learning in a live practice range is that candidates will encounter multiple layers of network segmentation, and the CPENT course will teach candidates how to navigate these layers, so that once access is gained in one segment, a candidate will know the latest pivoting techniques required to reach the next. However, that won’t be enough on its own as the targets and segments are progressive in nature, so once you get into one machine and or segment, the next one will challenge you even more!
The CPENT range requires your exploits be tested by different defenses you are likely to see in the wild. Candidates are required to get their exploits past the defenses by weaponizing them. Here is a sample of what else you can expect to find in the CPENT range:
- The Access Hidden Networks with Pivoting zone will require you to identify the filtering rules then penetrate the direct network. From there, candidates have to attempt pivots into hidden networks using single pivoting methods, but through a filter. Most certifications do not have a true pivot across disparate networks and few (if any) have the requirement into and out of a filtering device.The CPENT range contains a zone that is dedicated to ICS SCADA networks that the candidate will have to penetrate from the IT network side and gain access to the OT network.
- In the Privilege Escalation challenge, the latest methods of privilege escalation reverse engineering code to take control of execution then break out of the limited shell are required to gain root/admin.
- The Advanced Windows Attacks zone contains a complete forest that you first have to gain access to and then use PowerShell and any other means to execute Silver and Gold Ticket and Kerberoasting.
- CPENT is the first certification that requires you to locate IOT devices and then gain access to the network. Once on the network, you must identify the firmware of the IOT device, extract it, and then reverse engineer it.
- Once you have braved and mastered the challenges of the pivot, the next challenge is the double pivot. This is not something that you can use a tool for; in most cases the pivot has to be set up manually. CPENT is the first certification in the world that requires you to access hidden networks using double pivoting.
- CPENT
- 8 network ranges (zones)
- 105 lab exercises
Exam Insurance Program
Here at Masterclass we know that test taking can be very stressful, so we have developed a program to put your mind at ease.
While no one can guarantee that you will pass the exam, we can offer you Exam Insurance: If you fail either certification exam included in this program on the first attempt, EC-Council will pay for the next attempt. Any further attempts can be purchased at the reduced “retake” rate.
- Ethical Hackers
- Penetration Testers
- Network server administrators
- Firewall Administrators
- Security Testers
- System Administrators and Risk Assessment professionals
If you have any questions, please contact your account manager or
Contact Us directly!