Certified Penetration Tester (CPT) Training Boot Camp

Our most popular information security and hacking training covers in-depth techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises.

Award Winning Training

For 17 years InfoSec has been one of the most awarded and trusted information security training vendors - 42 industry awards!

Exam Pass Guarantee

We offer peace of mind with our Exam Pass Guarantee for Flex Pro students.

Analyst Recommended

IDC lists Infosec as Major Player in their Security Training Vendor Assessment.

CPT Hacking Course Overview

Our most popular information security and hacking training covers in-depth techniques used by malicious, black hat hackers with attention grabing lectures and hands-on lab exercises. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization. You leave with the ability to quantitatively assess and measure threats to information assets; and discover where your organization is most vulnerable to hacking in this network security training course.

The goal of this course is to help you master a repeatable, documentable penetration testing methodology that can be used in an ethical penetration testing or hacking situation.

The most current, up-to-date Ethical Hacking training available anywhere!

Black-hat hackers are always changing their tactics to get one step ahead of the good guys. Infosec updates our course materials regularly to ensure that you learn about the most current threats to your organization’s networks and systems.

Learn from Experts in the field of Information Security.

Our instructors have years of industry experience and are consistently recognized as experts in the field. Infosec instructors have authored two of the top Network Security and Ethical Hacking books.

Certifications & Compliance

IACRB’s Certified Penetration Tester (CPT)

In any hands-on hacking training course, it’s important to have the opportunity to prove your skill level to current or potential employers. This course prepares you for the CPT exam, which is given on-site. We’ve achieved a 93% pass rate for the CPT certification.

Prerequisites:

  • Firm understanding of the Windows Operating System
  • Exposure to the Linux Operating System or other Unix-based OS
  • Grasp of the TCP/IP protocols
  • Desire to learn about the hacking and network security profession, stay ethical, and get great security training!

Who This Class is For:

  • Security Analyst
  • Security Consultant
  • Security Researcher

Certified Penetration Tester Training

Rated 5/5 based on 1 customer review

Award-Winning Training

View Pricing

We will never share any of your information, spam you or annoy you with pushy sales pitches.

What You'll LEARN

    Run hacking attacks in our classroom labs, be a hacker for a week: Some of the hacking concepts you will learn to master during this hands on hacking course…

    • Penetration testing methodologies
    • Stealthy network recon
    • Passive traffic identification
    • Remote root vulnerability exploitation
    • Privilege escalation hacking
    • IPv6 Vulnerabilities
    • Remote access trojan hacking
    • Running shellcode in RAM vs. on disk
    • Wireless insecurity
    • Breaking IP-based ACLs via spoofing
    • Abusing Windows Named Pipes for Domain Impersonation
    • Evidence removal and anti-forensics
    • Attacking network infrastructure devices
    • Hacking by brute forcing remotely
    • Hiding exploit payloads in jpeg and gif image files
    • Hacking Web Applications
    • Breaking into databases with SQL Injection
    • Cross Site Scripting hacking
    • Hacking into Cisco routers
    • Justifying a penetration test to management & customers
    • CEH/CPT review
    • Defensive techniques

    What You'll DO

      Some of the instructor-led hands-on hacking lab exercises in this security training experience:

      • Capture the Flag hacking exercises every night!
      • Abusing DNS for host identification
      • Leaking system information from Unix and Windows
      • Windows 2003 Server & Vista DNS Cache Poisoning Attacks
      • Unix, Windows and Cisco password cracking
      • Remote buffer overflow exploit lab – heap vs. stack overflows
      • Attacking Kerberos Pre-Authentication Hashes
      • Spoofing endpoints of communication tunnels
      • Impersonation of other Users- Hijacking kernel tokens
      • Attacking RDP (Remote Desktop Protocol) in Windows XP, 2003 & Vista
      • Remote keylogging
      • Data mining authentication information from clear-text protocols
      • Sniffing and hijacking SSL encrypted sessions
      • Breaking wireless security via hacking
      • Malicious event log editing
      • Client side IE & Firefox exploits
      • Tunneling through IPSec VPNs by abusing ESP
      • Data retrieval with SQL Injection Hacking
      • Calculating the Return on Investment (ROI) for an ethical hack

      Our Major Clients

      Book your course

        What Our Students Are Saying

        Without any question, InfoSec has the most gifted individual instructors. Our instructor for this class was both an excellent educator and a premier/world class security expert. He was able to clearly explain and impart to the students, the most complicated security techniques I have ever heard of or imagined. I simply can not find the words to recommend him and Infosec security training more highly.
        JH

        John Hollan GE

        Advanced Ethical Hacking Training Boot Camp

        Career Tracks

        • Hacker Track

          The InfoSec Hacker Track will take you from 0 to 60 in your security career. By the time you successfully complete this track you will be highly credential-ed and in the top 5-10% of hackers in the world.
        Ready to get started? Get instant pricing for this award-winning boot camp. View course pricing