The Ethical Hacker Bootcamp is an immersive, instructor-led training program designed to build practical offensive cybersecurity skills through hands-on, real-world scenarios. Ideal for organizations seeking to strengthen internal cybersecurity capabilities, the course equips professionals with the tools and techniques necessary to identify and mitigate vulnerabilities before they can be exploited. Emphasizing live instruction and direct interaction with expert practitioners, the bootcamp offers a dynamic learning environment that goes beyond traditional certification prep. The curriculum supports real-world application and prepares participants for advanced certifications such as PJPT and PNPT. This bootcamp provides a practical foundation in ethical hacking for security professionals working to improve organizational resilience against modern threats.
This course includes three Exam Vouchers for TCM Security Certifications: Practical Junior Penetration Tester (PJPT), Practical Network Penetration Tester (PNPT), and Practical OSINT Research Professional (PORP). Each exam voucher includes 1 exam attempt and is valid for 12-months from the course completion date or certification release date.
Course Objective
Conducting internal and external penetration tests in enterprise-relevant environments
Executing privilege escalation techniques across Windows and Linux systems
Applying Open-Source Intelligence (OSINT) methods to inform attack strategies
Exploiting web applications to gain initial access
Leveraging Active Directory exploitation techniques, including A/V evasion, lateral movement, and Domain Controller compromise
Creating detailed, professional penetration testing reports for technical and executive audiences
Course Outline
Day 1: Introduction to OSINT
What is OSINT and the Intel Lifecycle?
What are Sock Puppets?
Search Engine Operators
Email OSINT
Password OSINT
Username OSINT
Image OSINT
Image OSINT Review
Video OSINT Review
Website OSINT
Business OSINT
Social Media OSINT
Day 2: Network Penetration Testing
Port Scanning Tactics
Service Enumeration
Shell Types, Payloads, and Exploitation
Privilege Escalation Tactics
External Pentest Methodology, Attack Strategy, and Report Writing
Day 3: Hacking and Defending Active Directory
Active Directory Overview
Pre-Compromise AD Attacks and Defenses
Post-Compromise AD Enumeration
Post-Compromise AD Attacks and Enumeration
AD Methodology, Attack Strategy, and Report Writing