PNPT Penetration Testing Course – Practical Ethical Hacking Training
The PNPT Penetration Testing Course at Educad Academy is a hands on cyber security training program designed to build real world ethical hacking and penetration testing skills. This course focuses on practical attack techniques used by professional penetration testers to identify, exploit, and report security vulnerabilities in modern IT environments.
Students learn the complete penetration testing process, including reconnaissance, enumeration, exploitation, privilege escalation, Active Directory attacks, lateral movement, and post exploitation. The training is fully practical and lab based, allowing learners to gain real experience attacking Windows, Linux, and enterprise network environments in a safe and controlled setup.
This course also prepares learners for PNPT style practical exams by emphasizing methodology, critical thinking, and professional reporting skills. Participants learn how to write detailed penetration testing reports, explain business risks, and provide remediation guidance just like real security consultants.
Ideal for beginners entering cyber security and IT professionals moving into ethical hacking, this PNPT Penetration Testing Course builds job ready skills aligned with current industry demands. Start your journey with Educad Academy and develop the technical expertise needed to work as a penetration tester, ethical hacker, or cyber security professional.
Course Objectives:
- Understand the complete penetration testing lifecycle using a professional methodology similar to real client engagements.
- Build and configure a practical home lab for safe, hands-on ethical hacking practice.
- Perform reconnaissance, scanning, and enumeration to identify vulnerabilities in target systems.
- Exploit common security weaknesses in Linux, Windows, and network environments.
- Escalate privileges on compromised systems using real-world techniques.
- Assess and attack Active Directory environments from an attacker’s perspective.
- Perform lateral movement and post-exploitation activities inside enterprise-style networks.
- Document findings clearly and produce professional penetration testing reports.
- Prepare for real-world penetration testing roles and PNPT-style exam approaches.
Course Content:
Module 1: Introduction to Penetration Testing & PNPT Methodology
This module builds the foundation of ethical hacking and prepares students to think like professional penetration testers.
- What penetration testing is and how it differs from vulnerability assessment
- Legal, ethical, and compliance considerations in security testing
- Real-world penetration testing lifecycle and engagement phases
- Rules of engagement, scoping, and client communication
- Overview of the PNPT exam methodology and reporting expectations
Module 2: Lab Setup & Environment Preparation
Students will set up their own hands-on penetration testing lab to practice real-world attacks in a safe environment.
- Installing and configuring VirtualBox / VMware
- Setting up Kali Linux and Windows attacker machines
- Creating vulnerable lab environments (Active Directory lab)
- Network configuration for isolated attack simulations
- Essential tools installation and environment optimization
Module 3: Networking Fundamentals for Pentesters
Understanding networks is critical for successful exploitation. This module explains networking from an attacker’s perspective.
- OSI model and TCP/IP in practical scenarios
- Common protocols (HTTP, SMB, FTP, DNS, RDP)
- IP addressing, subnets, and routing basics
- How firewalls, switches, and routers affect attacks
- Packet analysis basics using Wireshark
Module 4: Reconnaissance & Enumeration
This module focuses on gathering intelligence about targets without and with direct interaction.
- Passive reconnaissance and OSINT techniques
- Active scanning with Nmap and other tools
- Service and version detection
- SMB, SNMP, DNS, and web enumeration techniques
- Identifying potential attack surfaces
Module 5: Practical Ethical Hacking Techniques
Here students begin real exploitation against vulnerable systems.
- Exploiting misconfigurations and weak services
- Web application attack basics
- Password attacks (brute force, spraying, wordlists)
- Exploiting known vulnerabilities using public exploits
- Gaining initial access to systems
Module 6: Linux Privilege Escalation
After gaining access, attackers aim to gain higher privileges. This module covers Linux escalation techniques.:
- Understanding Linux permissions and SUID files
- Exploiting misconfigured services and cron jobs
- Kernel exploits and automated enumeration tools
- Credential harvesting on Linux systems
- Real-world privilege escalation scenarios
Module 7: Windows Privilege Escalation
This module focuses on privilege escalation inside Windows environments.
- Windows user rights and privilege concepts
- Service misconfigurations and weak permissions
- Registry-based privilege escalation
- Token impersonation and credential abuse
- Using tools like WinPEAS and PowerUp
Module 8: Active Directory Fundamentals
Active Directory is the heart of enterprise networks. This module explains how AD works.
- Active Directory structure and components
- Domains, users, groups, and organizational units
- Authentication protocols (Kerberos, NTLM)
- Domain controllers and trust relationships
- Why AD is a prime target for attackers
Module 9: Active Directory Enumeration & Attacks
Students will learn how attackers map and exploit Active Directory environments.
- Enumerating domain users, groups, and computers
- BloodHound for AD attack path analysis
- Kerberoasting and AS-REP roasting
- Password spraying in AD environments
- Identifying privilege escalation paths in a domain
Module 10: Lateral Movement & Post-Exploitation
This module teaches how attackers move inside a compromised network.
- Credential dumping techniques (Mimikatz basics)
- Pass-the-Hash and Pass-the-Ticket attacks
- Remote execution methods (SMB, WMI, WinRM)
- Maintaining persistence in compromised systems
- Data discovery and impact assessment
Module 11: Reporting & Documentation
Technical skills are not enough. Professional reporting is critical for a pentester.
- Structure of a professional penetration test report
- Writing clear vulnerability descriptions
- Risk rating and business impact explanation
- Evidence collection and screenshot documentation
- Remediation recommendations for clients
Module 12: Mock Pentest & Professional Debrief
Students will perform a full simulated penetration test from start to finish.
- Planning and executing a full penetration test
- Applying methodology in a realistic lab scenario
- Time management during an engagement
- Writing a complete professional report
- Conducting a professional debrief and presentation
Learning Outcomes:
- Confidently set up and manage a penetration testing lab environment.
- Conduct both passive and active reconnaissance using industry-standard tools.
- Identify open ports, services, and misconfigurations that can lead to system compromise.
- Gain initial access to vulnerable machines through practical exploitation techniques.
- Perform Linux and Windows privilege escalation without relying only on automated tools.
- Enumerate and attack Active Directory domains using tools like Blood Hound and common AD attack methods.
- Move laterally across a network using credential abuse and remote execution techniques.
- Maintain access and gather proof of impact during post-exploitation.
- Write clear, structured, and professional security assessment reports suitable for clients or management.
Target Audience:
- Beginners who want to start a career in ethical hacking and penetration testing.
- IT students who want practical cybersecurity skills beyond theory.
- Network and system administrators who want to understand how attackers think.
- SOC analysts and security professionals looking to move into offensive security.
- Anyone preparing for practical penetration testing certifications such as PNPT or similar hands-on exams.
Course Prerequisites:
- Basic understanding of how computers and operating systems work.
- Familiarity with using Windows and basic Linux commands.
- Fundamental knowledge of networking concepts such as IP addresses and ports.
- Strong interest in cybersecurity and ethical hacking.
- No advanced hacking experience is required; the course builds skills step by step.
International Student Fee: 550 USD
Flexible Class Options
- Corporate Group Training | Fast-Track
- Weekend Classes For Professionals SAT | SUN
- Online Classes – Live Virtual Class (L.V.C), Online Training
Related Courses
Diploma Cyber Security Training
Ethical Hacking Complete Training
Penetration Testing Certificate Course
CompTIA Security+ (SY0-701) Training Course

