Skip to Scheduled Dates
Course Overview
The Ethical Hacker Bootcamp is an immersive, instructor-led training program designed to build practical offensive cybersecurity skills through hands-on, real-world scenarios. Ideal for organizations seeking to strengthen internal cybersecurity capabilities, the course equips professionals with the tools and techniques necessary to identify and mitigate vulnerabilities before they can be exploited. Emphasizing live instruction and direct interaction with expert practitioners, the bootcamp offers a dynamic learning environment that goes beyond traditional certification prep. The curriculum supports real-world application and prepares participants for advanced certifications such as PJPT and PNPT. This bootcamp provides a practical foundation in ethical hacking for security professionals working to improve organizational resilience against modern threats.
This course includes three Exam Vouchers for TCM Security Certifications: Practical Junior Penetration Tester (PJPT), Practical Network Penetration Tester (PNPT), and Practical OSINT Research Professional (PORP). Each exam voucher includes 1 exam attempt and is valid for 12-months from the course completion date or certification release date.
Who Should Attend
- Clients with junior-level security talent, internal red teams, or helpdesk-to-pentest upskilling tracks
- Aspiring Ethical Hackers and Cybersecurity Professionals
- IT Professionals Seeking Specialization
- Students in Computer Science and Related Fields
- Students preparing for TCM Security’s PJPT, PNPT, or PORP certifications
Course Objectives
- Conducting internal and external penetration tests in enterprise-relevant environments
- Executing privilege escalation techniques across Windows and Linux systems
- Applying Open-Source Intelligence (OSINT) methods to inform attack strategies
- Exploiting web applications to gain initial access
- Leveraging Active Directory exploitation techniques, including A/V evasion, lateral movement, and Domain Controller compromise
- Creating detailed, professional penetration testing reports for technical and executive audiences
Course Outline
Day 1: Introduction to OSINT
- What is OSINT and the Intel Lifecycle?
- What are Sock Puppets?
- Search Engine Operators
- Email OSINT
- Password OSINT
- Username OSINT
- Image OSINT
- Image OSINT Review
- Video OSINT Review
- Website OSINT
- Business OSINT
- Social Media OSINT
Day 2: Network Penetration Testing
- Port Scanning Tactics
- Service Enumeration
- Shell Types, Payloads, and Exploitation
- Privilege Escalation Tactics
- External Pentest Methodology, Attack Strategy, and Report Writing
Day 3: Hacking and Defending Active Directory
- Active Directory Overview
- Pre-Compromise AD Attacks and Defenses
- Post-Compromise AD Enumeration
- Post-Compromise AD Attacks and Enumeration
- AD Methodology, Attack Strategy, and Report Writing
- AD Case Studies
- Network Pivoting
Day 4: Web Application Hacking
- Introduction to Modern Webapps
- Web Hacking Methodologies
- Key Resources
- Recon and Discovery (hands-on)
- Exploiting Common Vulnerabilities (hands-on)