Ethical Hacker Bootcamp
Expert Training
- Prepare for PJPT exam
- Prepare for PNPT exam
- Prepare for PORP exam
- Official TCM Certified Training
Training for Individuals
$2499
- Live, Instructor-led training
- Expert instructors
- Hands-on instruction
- Remote Training - Local Support
Upcoming Dates
Course Overview
Ideal for organizations seeking to strengthen internal cybersecurity capabilities, the course equips professionals with the tools and techniques necessary to identify and mitigate vulnerabilities before they can be exploited. This course includes three Exam Vouchers for TCM Security Certifications: Practical Junior Penetration Tester (PJPT), Practical Network Penetration Tester (PNPT), and Practical OSINT Research Professional (PORP). Each exam voucher includes 1 exam attempt and is valid for 12-months from the course completion date or certification release date.
Course Length: 4 Days
Audience: Clients with junior-level security talent, internal red teams, or helpdesk-to-pentest upskilling tracks. Aspiring Ethical Hackers and Cybersecurity Professionals. IT Professionals Seeking Specialization Students in Computer Science and Related Fields.
Prerequisites: This is a beginner level class. Basic knowledge of computers. CompTIA A+/Net+/Sec+ knowledge equivalent will prepare you to take this class.
What You're Going To Learn
- Conducting internal and external penetration tests in enterprise-relevant environments
- Executing privilege escalation techniques across Windows and Linux systems
- Applying Open-Source Intelligence (OSINT) methods to inform attack strategies
- Exploiting web applications to gain initial access
- Leveraging Active Directory exploitation techniques, including A/V evasion, lateral movement, and Domain Controller compromise
- Creating detailed, professional penetration testing reports for technical and executive audiences
Course Outline
Day 1: Introduction to OSINT
- What is OSINT and the Intel Lifecycle?
- What are Sock Puppets?
- Search Engine Operators
- Email OSINT
- Password OSINT
- Username OSINT
- Image OSINT
- Image OSINT Review
- Video OSINT Review
- Website OSINT
- Business OSINT
- Social Media OSINT
Day 2: Network Penetration Testing
- Port Scanning Tactics
- Service Enumeration
- Shell Types, Payloads, and Exploitation
- Privilege Escalation Tactics
- External Pentest Methodology, Attack Strategy, and Report Writing
Day 3: Hacking and Defending Active Directory
- Active Directory Overview
- Pre-Compromise AD Attacks and Defenses
- Post-Compromise AD Enumeration
- Post-Compromise AD Attacks and Enumeration
- AD Methodology, Attack Strategy, and Report Writing
- AD Case Studies
- Network Pivoting
Day 4: Web Application Hacking
- Introduction to Modern Webapps
- Web Hacking Methodologies
- Key Resources
- Recon and Discovery (hands-on)
- Exploiting Common Vulnerabilities (hands-on)
What to Expect at LeapFox
Knowledgeable Instructors
Our instructors are certified professionals. They are trained on the latest features and how to get the most out of software programs.
Hands-on Labs
No boring lectures! Our courses are designed to give students lots of time to practice what they are learning with hands-on exercises and projects.
Certificate of Completion
Receive a certificate of completion at the end of every course.
Up-to-date Curriculum
Each course comes with a helpful and up-to-date ebook which will contain instruction and practice exercises.
Time Saving Tips N Tricks
In each course, your instructor will show you tips and tricks that will save you time and make you more efficient.
Friendly and Helpful Staff
Our staff is dedicated to your success. Each team member is trained to provide the absolute best customer service possible.
Satisfaction Guarantee
If you aren't 100% satisfied with your experience at LeapFox, simply let us know, and we will make it right.
Look who Else is Using LeapFox