Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Hack The Box
  4. HTB Certified Penetration Testing Specialist (HTB CPTS)

HTB Certified Penetration Testing Specialist (HTB CPTS)

The Penetration Tester Job Role Path is for newcomers to information security who aspire to become professional penetration testers. This path covers core security assessment concepts and provides a deep understanding of the specialized tools, attack tactics, and methodology used during penetration testing. Armed with the necessary theoretical background and multiple practical exercises, students will go through all penetration testing stages, from reconnaissance and enumeration to documentation and reporting. Upon completing this job role path, you will have obtained the practical skills and mindset necessary to perform professional security assessments against enterprise-level infrastructure at an intermediate level. The Information Security Foundations skill path can be considered prerequisite knowledge to be successful while working through this job role path.

Provider Information

More courses from this provider:
Contact Information

Hack The Box
531 Luzon Avenue
Tampa, FL 33606

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Catalog Number
CPTS
Course Prerequisites
  • Interpreting a letter of engagement
  • Having intermediate knowledge around web and infrastructure penetration testing concepts
  • Knowledge around web application, operating system, and networking basics
  • Comfortably profiling and navigating a target network
  • Conducting manual and automated exploitation of various vulnerability classes
  • Professionally communicating and reporting vulnerabilities
Training Purpose
Skill Development
Specific Audience
All
Delivery Method
Online, Instructor-Led
Online, Self-Paced
  • Online, Instructor-Led
  • Online, Self-Paced

Learning Objectives

  • Penetration testing processes and methodologies
  • Information gathering & reconnaissance techniques
  • Attacking Windows & Linux targets
  • Active Directory penetration testing
  • Web application penetration testing
  • Manual & automated exploitation
  • Vulnerability assessment
  • Pivoting & Lateral Movement
  • Post-exploitation enumeration
  • Windows & Linux Privilege escalation
  • Vulnerability/Risk communication and reporting

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov(link sends email). Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date:

You have been selected to participate in a brief survey about your experience today with National Initiative for Cybersecurity Careers and Studies.

Would you like to participate in our survey?

If you accept you will be leaving the National Initiative for Cybersecurity Careers and Studies website and going to a third party site.
That site may have different privacy, security and accessibility policies than the National Initiative for Cybersecurity Careers and Studies site.
National Initiative for Cybersecurity Careers and Studies does not endorse any commercial products, services, programs or content on the third party website.
Thank you for visiting our site. We hope your visit was informative and enjoyable.