Description
Duration: 4 days
The Ethical Hacker Bootcamp is a hands-on, instructor-led program focused on developing practical offensive cybersecurity skills through real-world scenarios. The course teaches professionals how to identify and address vulnerabilities using the same tools and techniques used in actual engagements. This bootcamp is well-suited for organizations looking to build or expand internal penetration testing capabilities. Upon completion, students receive three exam vouchers for TCM Security certifications: Practical Junior Penetration Tester (PJPT), Practical Network Penetration Tester (PNPT), and Practical OSINT Research Professional (PORP), each valid for 12 months.
Target Audience
- Organizations with junior security staff, internal red teams, or helpdesk professionals transitioning into penetration testing roles
- Individuals pursuing a career in ethical hacking or cybersecurity
- IT professionals looking to specialize in offensive security
- Computer science students and those in related academic programs
- Candidates preparing for TCM Security’s PJPT, PNPT, or PORP certification exams
Prerequisites
What’s included?
- Authorized Courseware
- Intensive Hands on Skills Development with an Experienced Subject Matter Expert
- Hands on practice on real Servers and extended lab support 1.800.482.3172
- Examination Vouchers & Onsite Certification Testing – (excluding Adobe and PMP Boot Camps)
- Academy Code of Honor: Test Pass Guarantee
- Optional: Package for Hotel Accommodations, Lunch and Transportation
With several convenient training delivery methods offered, The Code Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Code Academy for an engaging and effective learning experience.
Methods
- Instructor Led (the best training format we offer)
- Live Online Classroom – Online Instructor Led
- Self-Paced Video
Speak to an Admissions Representative for complete details
| Start | Finish | Public Price | Public Enroll | Private Price | Private Enroll |
|---|---|---|---|---|---|
| 5/25/2026 | 5/28/2026 | ||||
| 6/15/2026 | 6/18/2026 | ||||
| 7/6/2026 | 7/9/2026 | ||||
| 7/27/2026 | 7/30/2026 | ||||
| 8/17/2026 | 8/20/2026 | ||||
| 9/7/2026 | 9/10/2026 | ||||
| 9/28/2026 | 10/1/2026 | ||||
| 10/19/2026 | 10/22/2026 | ||||
| 11/9/2026 | 11/12/2026 | ||||
| 11/30/2026 | 12/3/2026 | ||||
| 12/21/2026 | 12/24/2026 | ||||
| 1/11/2027 | 1/14/2027 | ||||
| 2/1/2027 | 2/4/2027 | ||||
| 2/22/2027 | 2/25/2027 | ||||
| 3/15/2027 | 3/18/2027 | ||||
| 4/5/2027 | 4/8/2027 | ||||
| 4/26/2027 | 4/29/2027 |
Learning Objectives
- Perform internal and external penetration tests in enterprise environments
- Execute privilege escalation techniques on both Windows and Linux systems
- Use Open-Source Intelligence (OSINT) methods to support attack planning
- Exploit web application vulnerabilities to achieve initial access
- Apply Active Directory attack techniques, including A/V evasion, lateral movement, and Domain Controller compromise
- Produce professional penetration testing reports suitable for both technical and executive audiences
Course Outline
Module Day 1: OSINT Fundamentals
Introduces the foundations of Open-Source Intelligence, including the Intel Lifecycle, Sock Puppets, and Search Engine Operators. Students work through hands-on exercises covering Email OSINT, Password OSINT, Username OSINT, Image OSINT, Video OSINT, Website OSINT, Business OSINT, and Social Media OSINT.
Module Day 2: Network Penetration Testing
Covers essential network penetration testing concepts including Port Scanning Tactics, Service Enumeration, Shell Types, Payloads, and Exploitation. Students also work through Privilege Escalation Tactics, External Pentest Methodology, Attack Strategy, and Report Writing.
Module Day 3: Active Directory Attacks and Defenses
Begins with an Active Directory overview and progresses through Pre-Compromise AD Attacks and Defenses, Post-Compromise AD Enumeration, and Post-Compromise AD Attacks. Additional topics include AD Methodology, Attack Strategy, Report Writing, AD Case Studies, and Network Pivoting.
Module Day 4: Web Application Hacking
Covers modern web application architecture and web hacking methodologies along with key reference resources. Students complete hands-on exercises in Recon and Discovery as well as exploitation of common web application vulnerabilities.