DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Talk To An Expert
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Talk To An Expert
CyberMaterial
Home Career Certification

Practical Network Penetration Tester™

by TCM Security

Reading Time: 2 mins read
in Analyst, Certification, Penetration Tester

IssuerTCM Security
LevelIntermediate-level
Career OpportunitiesSecurity Consultant, Cloud Penetration Tester, Web App Penetration Tester, Cloud Security Specialist, Network Security Specialist, Network Security Operations, Threat Intelligence Analyst, Vulnerability Analyst, Penetration Tester
Skills Social engineering techniques, cloud technologies, vulnerability scanning, vulnerability management, Code Analysis, Reporting, Planning, Scoping, OSINT
CostPaid
ValidityNo expiration date
ThemesPenetration testing, Ethical hacking, Risk management, Vulnerability assessment

Overview

The PNPT certification exam is a one-of-a-kind ethical hacking certification exam that assesses a student’s ability to perform an external and internal network penetration test at a professional level.  Students will have five (5) full days to complete the assessment and an additional two (2) days to write a professional report.

In order to receive the certification, a student must:

  • Perform Open-Source Intelligence (OSINT) to gather intel on how to properly attack the network
  • Leverage their Active Directory exploitation skillsets to perform A/V and egress bypassing, lateral and vertical network movements, and ultimately compromise the exam Domain Controller
  • Provide a detailed, professionally written report
  • Perform a live 15-minute report debrief in front of our assessors, comprised of all senior penetration testers

Official Study Materials

  • Practical Network Penetration Tester (PNPT) Exam Attempt – with Training
  • Accelerated Hacker Skill Camp
  • The External Pentest Playbook – Course

ENROLL TODAY

Disclaimer: Reference in this site to any specific commercial product, process, service, certification, or the use of any trade, firm or corporation name is for the information and convenience of the public, and does not constitute endorsement, recommendation, or favoring by CyberMaterial.
Tags: CertificationCommunicationComplianceCybersecurity certificationEthical HackingIntermediate-levelOffensive SecurityPenetration TestingRisk ManagementTCMvulnerability assessment
ADVERTISEMENT

Related Posts

Certified Security Leadership Officer (CSLO)

Certified Security Leadership Officer (CSLO)

August 18, 2023
Azure Administrator Associate

Azure Administrator Associate

August 18, 2023
AWS Certified Solutions Architect

AWS Certified Solutions Architect

August 18, 2023
Cisco Certified Network Associate (CCNA)

Cisco Certified Network Associate (CCNA)

August 18, 2023

More Articles

Cyber Briefing

Cyber Briefing 2023.08.25

August 25, 2023
Cyber101

Sleeper Bots Attack – Definitions

April 10, 2023
Cyber101

Web Application Firewalls (WAF)

March 29, 2022

IBM QRadar Advisor

March 18, 2021
Alerts

Threat actors are using Queen Elizabeth death in phishing attacks

September 15, 2022
Course

GDPR Compliance: Essential Training (2018)

March 24, 2022
Book

The Reality Game: How the Next Wave of Technology Will Break the Truth

December 1, 2020

RansomExx Leaks 52GB of Barcelona Health Centers’ Data

October 13, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Alerts
  • Incidents
  • News
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
    • Tutorials
  • Report Cyber Incident
  • GET HELP
  • Contact Us

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.