Course Summary

This course will teach you seasoned, hands-on red team and purple team skills. You will learn how to conduct environment reconnaissance, perform network and vulnerability scanning, execute password attacks, exploit vulnerabilities, escalate privileges, and manage Command and Control (C2) operations. Additionally, you will gain expertise in Active Directory attacks and work with penetration testing tools for both Linux and Windows systems, all within a time-restricted, real-world testing scenario.

Command and Control (C2) Communication and Evasion
The candidate will demonstrate mastery of communicating with a C2 framework and avoid detection.
Enterprise System Penetration Testing
The candidate will demonstrate mastery of evaluating entire enterprise systems for vulnerabilities, weaknesses, exploits, and misconfigurations.
Lateral Movement and Privilege Escalation
The candidate will demonstrate mastery of accessing hosts through lateral movement in a network and escalating privileges to gain access to otherwise inaccessible areas and objects.
Linux Penetration Testing Tools
The candidate will demonstrate mastery of using the Linux OS for penetration testing concepts and tools.
Network Access Exploitation
The candidate will demonstrate mastery of using tools to exploit vulnerabilities in a network to gain access to previously inaccessible hosts and segments.
Network Scanning for Pen Tests
The candidate will demonstrate mastery of scanning networks for information including hosts, software versions, vulnerabilities, and infrastructure for use in an offensive operation.
Offensive Operations Reconnaissance
The candidate will demonstrate mastery of gathering both sensitive and non-sensitive information from a variety of sources such as metadata, open-source intelligence, infrastructure documentation, and tool-based recon.
Password Analysis and Cracking
The candidate will demonstrate mastery of using password guessing and cracking tools to bypass authentication mechanisms and identify policy non-compliance.
Penetration Testing of Domain Environments
The candidate will demonstrate mastery of applying penetration testing techniques to Microsoft Active Directory environments.

The following are courses or equivalent experiences that are prerequisites for GX-PT: GIAC Penetration Tester Certification (GPEN) Exam code SEC560.

proctored exam Open book, open notes Time limit 4 hour 25 CyberLive - hands-on, real-world practical testing. CyberLive testing creates a lab environment where cyber practitioners prove their knowledge, understanding, and skill using: Actual programs Actual code Virtual machines

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?