Professional Documents
Culture Documents
TCM Security PNPT
TCM Security PNPT
TCM Security PNPT
Perform open-source intelligence Leverage their active directory Provide a detailed, professionally written Perform a live 15-minute report debrief in
(OSINT) to gather intel on how to exploitation skillsets to perform a/v and report. front of our assessors, comprised of all
properly attack the network. egress bypassing, lateral and vertical senior penetration testers
network movements, and ultimately
compromise the exam domain controller.
TIME IS IN YOUR
24/7
SUPPORT HANDS
The PNPT certification exam is a one-of-a-kind ethical hacking
OTHER TCM
VENDORS SECURITY
$299.00
USD
The standalone exam is perfect for students who are already well-versed in OSINT, external penetration testing techniques
(such as vulnerability scanning, information gathering, password spraying, credential stuffing, and exploitation), and internal
penetration testing techniques (such as LLMNR Poisoning, NTLM Relay Attacks, Kerberoasting, IPv6 attacks, and more).
PRACTICAL NETWORK
PENETRATION TESTER
WITH TRAINING
• Practical Ethical Hacking
• Linux Privilege Escalation for Beginners
• Windows Privilege Escalation for Beginners
• Open-Source Intelligence (OSINT) Fundamentals
• External Pentest Playbook
$399.00
USD
In addition to the lifetime voucher and exam attempt included in the standalone exam package, students who opt for the PNPT
with Training package will receive access to 50+ hours of course materials from TCM Academy.
WE TEACH YOU EVERYTHING YOU
NEED TO PASS THE PNPT EXAM.
PRACTICAL WINDOWS LINUX OPEN-SOURCE EXTERNAL
ETHICAL PRIVILEGE PRIVILEGE INTELLIGENCE PENTEST
HACKING ESCALATION ESCALATION FUNDAMENTALS PLAYBOOK
Education Presentation
Flagship Course
PRACTICAL
ETHICAL
HACKING COURSE CURRICULUM – 25 HOURS
• THE FOLLOWING CONCEPTS WILL BE TAUGHT IN THIS COURSE:
LEARN HOW TO HACK LIKE A PRO BY A PRO. 25 HOURS OF • A DAY IN THE LIFE OF AN ETHICAL HACKER
UP-TO-DATE PRACTICAL HACKING TECHNIQUES WITH • EFFECTIVE NOTEKEEPING
ABSOLUTELY NO FILLER. • NETWORKING REFRESHER
• INTRODUCTORY LINUX
IN THIS COURSE, YOU WILL LEARN THE PRACTICAL SIDE • INTRODUCTORY PYTHON
• HACKING METHODOLOGY
OF ETHICAL HACKING. TOO MANY COURSES TEACH • RECONNAISSANCE AND INFORMATION GATHERING
STUDENTS TOOLS AND CONCEPTS THAT ARE NEVER USED • SCANNING AND ENUMERATION
IN THE REAL WORLD. IN THIS COURSE, WE WILL FOCUS • EXPLOITATION BASICS
ONLY ON TOOLS AND TOPICS THAT WILL MAKE YOU • MID-COURSE CAPSTONE
WINDOWS
PRIVILEGE
ESCALATION COURSE CURRICULUM – 7 HOURS
• HOW TO ENUMERATE WINDOWS SYSTEMS MANUALLY AND WITH TOOLS
• A MULTITUDE OF PRIVILEGE ESCALATION TECHNIQUES, INCLUDING:
LEARN HOW TO ESCALATE PRIVILEGES ON WINDOWS
MACHINES WITH ABSOLUTELY NO FILLER. • KERNEL EXPLOITS
• PASSWORD HUNTING
LINUX
PRIVILEGE
ESCALATION COURSE CURRICULUM – 6.5 HOURS
• HOW TO ENUMERATE LINUX SYSTEMS MANUALLY AND WITH TOOLS
LEARN HOW TO ESCALATE PRIVILEGES ON WINDOWS • A MULTITUDE OF PRIVILEGE ESCALATION TECHNIQUES, INCLUDING:
MACHINES WITH ABSOLUTELY NO FILLER. • Kernel Exploits
• Password Hunting
• File Permissions
THIS COURSE FOCUSES ON LINUX PRIVILEGE ESCALATION • Sudo Attacks
TACTICS AND TECHNIQUES DESIGNED TO HELP YOU • SUID Attacks
IMPROVE YOUR PRIVILEGE ESCALATION GAME. • Shared Object Injection
• Binary Symlinks
• Environment Variables
• Capabilities Attacks
• NFS
• Docker
• & Much More!
OPEN-SOURCE
INTELLIGENCE
FUNDAMENTALS COURSE CURRICULUM – 9 HOURS
• THE FOLLOWING CONCEPTS WILL BE TAUGHT IN THIS COURSE:
LEARN THE INS AND OUTS OF OPEN-SOURCE • OSINT Overview
INTELLIGENCE AND STEP UP YOUR INVESTIGATIVE GAME. • Effective Notekeeping
• Creating Sock Puppet Accounts
THIS COURSE FOCUSES ON OPEN-SOURCE INTELLIGENCE • Basic and Advanced Search Engine OSINT
EXTERNAL
PENTEST
PLAYBOOK COURSE CURRICULUM – 3.5 HOURS
• THE FOLLOWING CONCEPTS WILL BE TAUGHT IN THIS COURSE:
LEARN TO CONDUCT AN EXTERNAL NETWORK • Objectives of an External Pentest
PENETRATION TEST FROM START TO FINISH. • Important Documents and Procedures
• Scope Verification and Client Communication
Learn More
FAQ Frequently Asked Questions
How long is the exam? How does the exam compare to other certifications?
The exam environment permits five full days to simulate a
real pentest, though you can complete the engagement In short, it really doesn’t. The exam was designed because
objectives ahead of time. the industry is lacking in practical certifications. Some
certifications are multiple choice and do not test a student’s
You will have an additional two days to write a professional technical skills. Other exams are hands on, but are not
report and submit it to our team. realistic in time allotment or attack methodology. This exam
replicates a true pentest in both attack methodology and the
amount of time permitted to perform the test.
Learn More
FAQ Frequently Asked Questions
Is the provided training enough to pass the exam? Is the exam proctored?
No. We do monitor network traffic in the exam
Yes. It was designed for student’s to pass the exam with environment and have detection mechanisms in place
the training. The training is designed for students from for cheating in the environment and the exam, but there
absolute beginner to moderate levels and will teach you will be no proctor or intrusive software to install on your
the skills necessary to be successful as a penetration machine.
tester.
Learn More
The future begins here.
IN THE
FIRST YEAR
To see more reviews and testimonials please
“Of all the certs I’ve received over the “I am completely blown away with “If you want an exam that is real
years, this one required the most TCM Security and how amazing this world, this is as good as it gets.”
TCM Security has trained students from all walks of life, including some of these outstanding
DIFFERENCE
To Name a Few:
Short list of organizations that
THANK YOU!
Practical Network Penetration Tester Certification & Exam
THANK YOU!