Penetration Testing Training Boot Camp
Transform your career in 10 days

Course essentials
Boot camp at a glance
-
Method
Live online, in-person, team onsite
-
Duration
10 days
-
Experience
1-3 years
-
Average salary
$103,000
-
Meets 8570.1
DoD information assurance requirements
Ready to discuss your training goals? We've got you covered.
Complete the form and book a meeting with a member of our team to explore your learning opportunities.
This is where the error message would go.
Thanks! We look forward to meeting with you!
What you'll learn
Training overview

Infosec’s penetration testing training — delivered in a 10-day boot camp — is the information security industry’s most comprehensive penetration testing program available.
You’ll learn up-to-date skills around penetration testing, from the use of network reconnaissance tools to the writing of custom zero-day buffer overflow exploits. This course aims to help you master a repeatable, documentable penetration testing methodology you can use in an ethical penetration testing or hacking situation. This Penetration Testing Training Boot Camp will have you walk out the door with hacking skills that are highly in demand, as well as up to four certifications:
- Certified Ethical Hacker (CEH)
- CompTIA PenTest+
- Certified Penetration Tester (CPT)
- Certified Expert Penetration Tester (CEPT)
Award-winning training you can trust






What's included
Everything you need to know

- 90-day extended access to Boot Camp components, including class recordings
- 100% Satisfaction Guarantee
- Exam Pass Guarantee
- Exam voucher
- Free 90-day Infosec Skills subscription (access to 1,400+ additional courses and labs)
- Hands-on cyber ranges and labs
- Knowledge Transfer Guarantee
- Onsite proctoring of exam
- Pre-study learning path
- Unlimited practice exam attempts
What makes the Infosec Penetration Testing prep course different?
You can rest assured that the Penetration Testing training materials are fully updated and synced with the latest version of the exam. In addition, you’ll gain access to a Penetration Testing prep course the moment you enroll, so you can prepare for and get the most out of your boot camp.
With 20 years of training experience, we stand by our Penetration Testing training with an Exam Pass Guarantee. This means if you don’t pass the exam on the first attempt, we’ll pay for your second exam at no additional cost to you!
Before your boot camp
Prerequisites
Syllabus
Training schedule
Day 1
Testing methodologies
- Security testing methodologies
- The ethical hacking profession
- Planning and scoping an engagement
- Legal and compliance considerations
- Ethical hacking methodologies
- Tools of the trade
- Linux overview
- Passive intelligence gathering
- Abusing DNS
- Abusing SNMP
- Security testing methodologies
Testing methodologies continued
Testing methodologies continued
Schedule may vary from class to class
Day 2
Network scanning and service identification
- Understanding TCP packets and structuresPassive network discovery and scanning
- TCP scanning
- Using differences in RFC implementations to your advantage
- Scanning through firewalls
- How to prevent the discovery of your reconnaissance activities
- Using zombies to mask network scanning
- Avoiding IDS/IPS detection
- Proper identification of services
- Vulnerability identification
Network scanning and service identification continued
Network scanning and service identification continued
Schedule may vary from class to class
Day 3
Exploiting vulnerabilities and social engineering techniques
- Vulnerability life cycles
- Types of vulnerabilities
- Flaws in encryption
- Configuration errors
- Buffer overflows
- Stack overflows
- Vulnerability mapping
- Exploit utilization and delivery methods
- Client-side exploits
Exploiting vulnerabilities and social engineering techniques continued
Exploiting vulnerabilities and social engineering techniques continued
Schedule may vary from class to class
Day 4
SQL injection and attacks
- Use of Trojans
- Redirecting ports to thwart firewall rules
- Avoiding anti-virus detection
- Lateral movement and persistence
- Use of keyloggers
- IDS operations and avoidance
- Encrypting your communications
- Protocol abuse for covert communications
- And many more!
SQL injection and attacks continued
SQL injection and attacks continued
Schedule may vary from class to class
Day 5
Scripts for ethical hacking and mitigation strategies
- Sniffing in different environments
- Attack sniffers
- Man-in-the-middle attacks
- Wireless networking
- Shared key authentication weaknesses
- WEP/WPA/WPA2 cracking
- Anti-forensics
Scripts for ethical hacking and mitigation strategies continued
Scripts for ethical hacking and mitigation strategies continued
Schedule may vary from class to class
Day 6
Advanced recon
- Advanced recon
- Blinding IDSs
- Vulnerability mapping
Advanced recon continued
Schedule may vary from class to class
Day 7
x86 assembly for exploit development
- x86 assembly for exploit development
- Finding vulnerabilities with debuggers
- Reversing win32 applications with IDA
- Fuzzing/fault injection
- Memory architecture and stack-based overflows
x86 assembly for exploit development continued
Schedule may vary from class to class
Day 8
SEH exploits
- SEH exploits
- Return oriented programming
- Writing shellcode
- Egghunters
- Restricted character set exploitation
- Attacking format strings
- Payloads
SEH exploits continued
Schedule may vary from class to class
Day 9
Metasploit payloads
- Metasploit payloads
- Advanced metasploit
- Compressors and encryptors
- Advanced client side exploits
- Attacking network-based protocols
Metasploit payloads continued
Metasploit payloads continued
Schedule may vary from class to class
Day 10
Exploiting web apps
- Exploiting web apps
- Web application hacking
- SQL injection in MS SQL
- SQL injection in MySQL
- CD & DVD-ROM protections
Exploiting web apps continued
Schedule may vary from class to class
Guaranteed results
Our boot camp guarantees

Exam Pass Guarantee
If you don’t pass your exam on the first attempt, get a second attempt for free. Includes the ability to re-sit the course for free for up to one year (does not apply to CMMC-AB boot camps).

100% Satisfaction Guarantee
If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.

Knowledge Transfer Guarantee
If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.
Unlock team training discounts
If you’re like many of our clients, employee certification is more than a goal — it’s a business requirement. Connect with our team to learn more about our training discounts.

FAQ
Frequently asked questions
What is penetration testing?
How do I become a penetration tester?
Becoming a penetration tester is like signing up for an exciting digital adventure. It typically starts with a strong foundation in computer systems and networks. And it’s best to learn once you’ve got a good grasp of the Windows Operating System, Linus Operating System, TCP/IP protocols and network reconnaissance tools like Nmap, Nessus and Netcat.
Many successful pentesters have learned the ropes through self-study, online courses or boot camps (like ours). Certifications like Certified Ethical Hacker (CEH) and CompTIA PenTest+ are valuable stepping stones, but remember, the learning never stops! The world of cybersecurity is always evolving, so continuous learning and curiosity are your best companions on this journey.
Is penetration testing a rewarding career?
What is network penetration testing?
You're in good company
CY
Chris Young, MaintechI have never had a better experience in any previous training. The instructor gave the information needed for the test and also shared his real-world experience to bring it together. I would not hesitate recommending this class to anyone interested in CEH.
JK
Jeremy Kicklighter, ACI WorldwideI thoroughly enjoyed the Ethical Hacking class. I would venture to say it is one of the best technical classes I have ever attended. I feel very confident that I will be able to take my learning experience and be better able to defend our company assets.
SF
Stephen Field, Thomas Compliance Associates, Inc.The course materials were excellent. The class format was fantastic. The instructor not only prepared us for the examination but also spent a considerable amount of time in learning practical skills for the real world.
Explore our top boot camps