Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Hack The Box
  4. HTB Certified Penetration Testing Specialist (HTB CPTS)

HTB Certified Penetration Testing Specialist (HTB CPTS)

The Penetration Tester Job Role Path is for newcomers to information security who aspire to become professional penetration testers. This path covers core security assessment concepts and provides a deep understanding of the specialized tools, attack tactics, and methodology used during penetration testing. Armed with the necessary theoretical background and multiple practical exercises, students will go through all penetration testing stages, from reconnaissance and enumeration to documentation and reporting. Upon completing this job role path, you will have obtained the practical skills and mindset necessary to perform professional security assessments against enterprise-level infrastructure at an intermediate level. The Information Security Foundations skill path can be considered prerequisite knowledge to be successful while working through this job role path.

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Catalog Number
CPTS
Course Prerequisites
  • Interpreting a letter of engagement
  • Having intermediate knowledge around web and infrastructure penetration testing concepts
  • Knowledge around web application, operating system, and networking basics
  • Comfortably profiling and navigating a target network
  • Conducting manual and automated exploitation of various vulnerability classes
  • Professionally communicating and reporting vulnerabilities
Training Purpose
Skill Development
Specific Audience
All
Delivery Method
Online, Instructor-Led
Online, Self-Paced
  • Online, Instructor-Led
  • Online, Self-Paced

Learning Objectives

  • Penetration testing processes and methodologies
  • Information gathering & reconnaissance techniques
  • Attacking Windows & Linux targets
  • Active Directory penetration testing
  • Web application penetration testing
  • Manual & automated exploitation
  • Vulnerability assessment
  • Pivoting & Lateral Movement
  • Post-exploitation enumeration
  • Windows & Linux Privilege escalation
  • Vulnerability/Risk communication and reporting

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: