The PNPT Accelerated Camp is an innovative program specifically designed for individuals aspiring to enter the field of ethical hacking, as well as for those seeking to enhance their professional skills. This program stands out for its focus on live training, offering a dynamic and interactive learning environment that greatly benefits students who thrive under direct instruction. Participants will receive immediate feedback and guidance from expert instructors, fostering a more engaging and effective learning experience. Whether you’re looking to kickstart a career in cybersecurity or aiming to elevate your existing professional expertise, the PNPT Accelerated Camp provides a comprehensive, hands-on approach that will prepare you for the PJPT and PNPT penetration testing certifications.
Please note that this course may meet once a week for 4 weeks.
Course Objective
Our four day accelerated training program provides practical hands-on experience that will prepare you for the Practical Network Penetration Tester Certification from TCM.
In this penetration testing training course, you will learn how to:
Use different tactics and techniques for Windows and Linux privilege escalation.
Perform Open-Source Intelligence (OSINT) to gather intel on how to properly attack the network.
Leverage Active Directory exploitation skill sets to perform A/V and egress bypassing, lateral and vertical network movements, and ultimately compromise the Domain Controller.
Perform internal and external penetration tests in real-world environments.
Exploit web applications to gain a foothold in a network.
Provide a detailed, professionally written report.
Course Outline
1 – Intro to OSINT
What is OSINT and the Intel Lifecycle?
What are Sock Puppets?
Search Engine Operators
Email OSINT
Password OSINT
Username OSINT
Image OSINT
Image OSINT Review
Video OSINT Review
Website OSINT
Business OSINT
Social Media OSINT
2 – PNPT Preparation
Port Scanning Tactics
Service Enumeration
Shell Types, Payloads, and Exploitation
Privilege Escalation Tactics
External Pentest Methodology, Attack Strategy, and Report Writing
3 – Hacking and Defending Active Directory
Active Directory Overview
Pre-Compromise AD Attacks and Defenses
Post-Compromise AD Enumeration
Post-Compromise AD Attacks and Enumeration
AD Methodology, Attack Strategy, and Report Writing