Ethical Hacker Bootcamp

Price
$2,699.00 USD

Duration
4 Days

 

Delivery Methods
Virtual Instructor Led
Private Group

Course Overview

The Ethical Hacker Bootcamp is an immersive, instructor-led training program designed to build practical offensive cybersecurity skills through hands-on, real-world scenarios. Ideal for organizations seeking to strengthen internal cybersecurity capabilities, the course equips professionals with the tools and techniques necessary to identify and mitigate vulnerabilities before they can be exploited. Emphasizing live instruction and direct interaction with expert practitioners, the bootcamp offers a dynamic learning environment that goes beyond traditional certification prep. The curriculum supports real-world application and prepares participants for advanced certifications such as PJPT and PNPT. This bootcamp provides a practical foundation in ethical hacking for security professionals working to improve organizational resilience against modern threats.

This course includes three Exam Vouchers for TCM Security Certifications: Practical Junior Penetration Tester (PJPT), Practical Network Penetration Tester (PNPT), and Practical OSINT Research Professional (PORP). Each exam voucher includes 1 exam attempt and is valid for 12-months from the course completion date or certification release date.

Course Objectives

  • Conducting internal and external penetration tests in enterprise-relevant environments
  • Executing privilege escalation techniques across Windows and Linux systems
  • Applying Open-Source Intelligence (OSINT) methods to inform attack strategies
  • Exploiting web applications to gain initial access
  • Leveraging Active Directory exploitation techniques, including A/V evasion, lateral movement, and Domain Controller compromise
  • Creating detailed, professional penetration testing reports for technical and executive audiences

Who Should Attend?

  • Clients with junior-level security talent, internal red teams, or helpdesk-to-pentest upskilling tracks
  • Aspiring Ethical Hackers and Cybersecurity Professionals
  • IT Professionals Seeking Specialization
  • Students in Computer Science and Related Fields
  • Students preparing for TCM Security’s PJPT, PNPT, or PORP certifications
  • Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
  • Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
  • Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
  • Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
  • Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
  • Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.

Learning Credits: Learning Credits can be purchased well in advance of your training date to avoid having to commit to specific courses or dates. Learning Credits allow you to secure your training budget for an entire year while eliminating the administrative headache of paying for individual classes. They can also be redeemed for a full year from the date of purchase. If you have previously purchased a Learning Credit agreement with New Horizons, you may use a portion of your agreement to pay for this class.

If you have questions about Learning Credits, please contact your Account Manager.

Agenda

Day 1: Introduction to OSINT

  • What is OSINT and the Intel Lifecycle?
  • What are Sock Puppets?
  • Search Engine Operators
  • Email OSINT
  • Password OSINT
  • Username OSINT
  • Image OSINT
  • Image OSINT Review
  • Video OSINT Review
  • Website OSINT
  • Business OSINT
  • Social Media OSINT

Day 2: Network Penetration Testing

  • Port Scanning Tactics
  • Service Enumeration
  • Shell Types, Payloads, and Exploitation
  • Privilege Escalation Tactics
  • External Pentest Methodology, Attack Strategy, and Report Writing

Day 3: Hacking and Defending Active Directory

  • Active Directory Overview
  • Pre-Compromise AD Attacks and Defenses
  • Post-Compromise AD Enumeration
  • Post-Compromise AD Attacks and Enumeration
  • AD Methodology, Attack Strategy, and Report Writing
  • AD Case Studies
  • Network Pivoting

Day 4: Web Application Hacking

  • Introduction to Modern Webapps
  • Web Hacking Methodologies
  • Key Resources
  • Recon and Discovery (hands-on)
  • Exploiting Common Vulnerabilities (hands-on)
 

Upcoming Class Dates and Times

Oct 17, 24, 31 & Nov 7
9:00 AM - 3:00 PM
ENROLL $2,699.00 USD
CourseID: 3606151E
 



Do You Have Additional Questions? Please Contact Us Below.

contact us contact us 
Contact Us about Starting Your Business Training Strategy with New Horizons