loader

Training & Certifications

Certified Penetration Testing Professional (C|PENT)


Offered by EC-Council, Certified Penetration Testing Professional (C|PENT) is a multidisciplinary course with extensive hands-on training in a wide range of crucial skills, including advanced Windows attacks, Internet of Things (IoT) and Operational Technology (OT) systems, filtered network bypass techniques, exploit writing, single and double pivoting, advanced privilege escalation, and binary exploitation. The C|PENT training program offered by Multimatics is designed to provide the knowledge and skills needed to perform an effective penetration testing in an enterprise network environment that must be attacked, exploited, evaded, and defended. The training material is prepared based on the latest edition of C|PENT, accompanied by discussions and exercises to work on the questions.

Multimatics is an Authorized Training Center for the Certified Penetration Testing Professional (C|PENT) training and certification program accredited by the EC-Council.


By the end of the program, participants will be able to:

  • Advanced Windows Attacks
  • Attacking IoT Systems
  • Writing Exploits: Advanced Binary Exploitation
  • Bypassing a Filtered Network
  • Pentesting Operational Technology (OT)
  • Access Hidden Networks with Pivoting
  • Double Pivoting
  • Privilege Escalation
  • Evading Defense Mechanisms
  • Attacking Automation with Scripts
  • Weaponizing Exploits
  • Writing Professional Reports

The program is designed for:

  • Ethical Hackers
  • Penetration Testers
  • Network Server Administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and Risk Assessment Professionals
  • Cybersecurity Forensic Analyst
  • Cyberthreat Analyst
  • Cloud Security Analyst
  • Information Security Analyst
  • Application Security Analyst
  • Cybersecurity Assurance Engineer
  • Security Operations Center (SOC) Analyst
  • Technical Operations Network Engineer
  • Information Security Engineer
  • Network Security Penetration Tester
  • Network Security Engineer
  • Information Security Architect

This program is a 5 days of intensive training class.


The program provided by Multimatics will be delivered through interactive presentation by professional instructor(s), group debriefs, individual and team exercises, behavior modelling and roleplays, one-to-one and group discussion, case studies, and projects.


There are no predefined requirements for those interested in attempting the C|PENT exam.


Participants will take a fully online, remotely proctored performance-based, hands-on C|PENT Exam which is broken into two practical exams of 12-hours. They will be given the option to choose either two 12-hour exams or one 24-hour exam. Participants who successfully passed the exam with 70% will be given an official Certified Penetration Testing Professional (C|PENT) certification from EC-Council. Participants who score more than 90% attain the prestigious LPT (Master) credential.


  1. The Fundamentals of Penetration Testing
  2. Penetration Testing Approaches, Strategies, Methodologies, Techniques, and Various Guidelines
  3. Recommendations for Penetration Testing
  1. The Different Stages and Elements of Scoping
  2. The Engagement in Penetration Testing
  1. How to Use Techniques and Tools to Gather Intelligence about the Target from Publicly Available Sources such as the World Wide Web (WWW), through Website Analysis, by Using Tools/Frameworks/Scripts
  1. Different Social Engineering Techniques
  2. Perform Social Engineering Penetration Testing on a Target Organization
  1. Security Concerns
  2. Using Best Practices
  3. Using Access Controls
  4. Behavioral Security Concepts
  1. How to Implement a Comprehensive Penetration Testing Methodology for Assessing Networks from Insider’s Perspectives
  1. How to Implement a Comprehensive Penetration Testing Methodology for Assessing the Security of Network Perimeter Devices, such as Firewalls, IDS, Routers, and Switches
  1. How to Analyze Web Applications for Various Vulnerabilities, Including the Open Web Application Security Project (OWASP) Top 10
  2. Determine the Risk of Exploitation
  1. How to Test Various Components of Wireless Networks, such as WLAN, RFID Devices, and NFC Technology Devices
  1. How to Test Various Components of Wireless Networks, such as WLAN, RFID Devices, and NFC Technology Devices
  1. Various Threats to Internet of Things (IoT) Networks
  2. How to Audit Security Controls for Various Inherent IoT Risks
  1. OT and SCADA Concepts
  2. The Process of Testing Various Components of OT and SCADA Networks
  1. How to Test Various Components of Wireless Networks, such as WLAN, RFID Devices, and NFC Technology Devices
  1. Security Threats and Concerns in Cloud Computing
  2. How to Perform Cloud Penetration Testing to Determine the Probability of Exploitation
  1. Understand the Binary Analysis Methodology and Reverse Engineer Applications to Identify Vulnerable Applications that May Lead to the Exploitation of an Information System
  1. How To Document and Analyze the Results of a Penetration Test
  2. Recommend Post-Penetration Test Actions

Scroll to Top