Learn about us
Individual courses and packages with special discount
Technical labor programs endorsed by the Ministry of Education
Explore high-demand technology areas
Certifications from technology leaders
Descubre nuestra trayectoria como institución de educación de alta calidad
Programas alineados a certificaciones internacionales y necesidades del mercado global
Ver Oferta Académica CompletaC|PENT is a rigorous penetration testing course that teaches multidisciplinary skills to perform effective tests in filtered networks. The course provides hands-on training in advanced attacks on Windows systems, IoT, OT, privilege escalation, binary exploitation, pivoting, and more. It is desig…
It presents the fundamental principles, ethical framework, methodologies, and phases that govern a professional penetration test, as well as the regulations and best practices of the industry.
Explains how to establish the boundaries of the exercise, confidentiality agreements, legal authorizations, and the necessary documentation to initiate an ethical test.
Covers techniques for collecting useful information from open sources (Open Source Intelligence), such as search engines, social networks, DNS, WHOIS, and public databases.
Teaches how to assess the human link through phishing emails, physical attacks, and simulated campaigns to measure security awareness.
It focuses on identifying and exploiting vulnerabilities in systems exposed to the Internet, including servers, remote services, and misconfigured networks.
Simulates attacks from within the corporate network. Teaches enumeration techniques, lateral movement, and privilege escalation within the internal environment.
Explore how to attack perimeter devices such as routers, firewalls, and VPNs, and how to compromise them to access internal networks.
Includes SQL injection testing, XSS, CSRF, file inclusion, and other attack techniques on modern websites and web applications.
Covers attacks on Wi-Fi networks, such as cracking WEP/WPA keys, rogue APs, packet sniffing, and deauthentication attacks.
It addresses the analysis of smart devices, access to firmware, UART ports, specific protocols, and common vulnerabilities in the IoT ecosystem.
Train in the evaluation of industrial control systems, including protocols such as Modbus and DNP3, attacks on PLCs, and risks in industrial environments.
Provides practice on techniques for auditing cloud environments (AWS, Azure, GCP), exploiting insecure configurations, exposed credentials, and poorly managed permissions.
Teaches advanced exploitation at the operating system level, including buffer overflows, format string vulnerabilities, heap overflows, and modern evasion techniques.
Guide to structuring a professional pentesting report, presenting findings, risks, technical evidence, and clear executive recommendations.
C|PENT is a rigorous penetration testing course that teaches multidisciplinary skills to perform effective tests in filtered networks. The course provides hands-on training in advanced attacks on Windows systems, IoT, OT, privilege escalation, binary exploitation, pivoting, and more.
It is designed to simulate real enterprise environments with multiple network segments, offering complex and progressively challenging scenarios.
At the end of the course, participants will be able to:
To fully benefit from the course, participants are required to have:
| Our Value Proposition | Benefit for Participant or Company |
|---|---|
| International Certification Penetration Testing Professional (C|PENT) | 40 hours |
| • E-learning reinforcement topics and exclusive materials and simulators | • Complementary platform with digital resources, study guides, support recordings and exam simulators. |
| • Flexible educational model (in-person or live remote) | • Possibility to choose modality without losing human interaction and teaching support. |
| • Focus on employability and professional performance and exam preparation. | • Preparation oriented to certification, job performance and professional scaling based on practice, enhanced with AI support. |
| • Integration of Artificial Intelligence in learning | • Students use AI tools to reinforce understanding, practice exams and enhance their productivity. |
| • International Certification included | • Official endorsement with global recognition. Includes certification exams and access to the partner platform. |
| • Laboratories in real learning environments. | • Unlimited practical experience with real lab accounts and access to professional cloud infrastructure. |
| • Live classes with certified expert instructors. | • Guided and personalized training with direct real-time support, not offline. Recorded classes only for review. |
| • Personalized attention, small groups. | • Individual tracking, progress evaluations and technical support during training. AI-proctored performance examiner. |
| • Post-certification support and extended access to resources | • Post-assistance, access to materials for and continuous updates. |
| • Practical methodology and real and/or simulated projects. | • Applied learning from day one: simulations, business cases, projects and real cloud environments. |
| • Certificates of Approval and/or participation. | • International Certification by EC-COUNCIL
• Infinity Training Institute USA: International Certification Diploma in English • Aula Matriz IETDH Colombia - Certificate of participation |
At Infinity Training Institute, we apply a comprehensive, ever-evolving methodology centered on practical learning, powered by Artificial Intelligence, enabling personalized instruction, performance assessment, and optimized preparation for international certifications with certified instructors, real labs, simulators, and e-learning platforms. Participants learn by doing, developing technical and professional skills in small groups, with personalized follow-up and pre and post-certification support. Infinity Training Institute: Learn. Apply. Get Certified. Transcend.
C|PENT is a rigorous penetration testing course that teaches multidisciplinary skills to perform effective tests in filtered networks. The course provides hands-on training in advanced attacks on Windows systems, IoT, OT, privilege escalation, binary exploitation, pivoting, and more.
It is designed to simulate real enterprise environments with multiple network segments, offering complex and progressively challenging scenarios.
At the end of the course, participants will be able to:
To fully benefit from the course, participants are required to have:
| Our Value Proposition | Benefit for Participant or Company |
|---|---|
| International Certification Penetration Testing Professional (C|PENT) | 40 hours |
| • E-learning reinforcement topics and exclusive materials and simulators | • Complementary platform with digital resources, study guides, support recordings and exam simulators. |
| • Flexible educational model (in-person or live remote) | • Possibility to choose modality without losing human interaction and teaching support. |
| • Focus on employability and professional performance and exam preparation. | • Preparation oriented to certification, job performance and professional scaling based on practice, enhanced with AI support. |
| • Integration of Artificial Intelligence in learning | • Students use AI tools to reinforce understanding, practice exams and enhance their productivity. |
| • International Certification included | • Official endorsement with global recognition. Includes certification exams and access to the partner platform. |
| • Laboratories in real learning environments. | • Unlimited practical experience with real lab accounts and access to professional cloud infrastructure. |
| • Live classes with certified expert instructors. | • Guided and personalized training with direct real-time support, not offline. Recorded classes only for review. |
| • Personalized attention, small groups. | • Individual tracking, progress evaluations and technical support during training. AI-proctored performance examiner. |
| • Post-certification support and extended access to resources | • Post-assistance, access to materials for and continuous updates. |
| • Practical methodology and real and/or simulated projects. | • Applied learning from day one: simulations, business cases, projects and real cloud environments. |
| • Certificates of Approval and/or participation. | • International Certification by EC-COUNCIL
• Infinity Training Institute USA: International Certification Diploma in English • Aula Matriz IETDH Colombia - Certificate of participation |
At Infinity Training Institute, we apply a comprehensive, ever-evolving methodology centered on practical learning, powered by Artificial Intelligence, enabling personalized instruction, performance assessment, and optimized preparation for international certifications with certified instructors, real labs, simulators, and e-learning platforms. Participants learn by doing, developing technical and professional skills in small groups, with personalized follow-up and pre and post-certification support. Infinity Training Institute: Learn. Apply. Get Certified. Transcend.
Solo te pedimos tu número para explicarte nuestra metodología y brindarte una atención personalizada.