Pentester Prep Workshop

Pentester Prep Workshop: Offensive Skills For Defensive Purposes

Through real-world, hands-on instruction, and with a focus on offensive security, we provide a path to a successful career as a penetration tester.

Are you interested in learning the skills needed to test the defense of computers and networks around the world? Penetration testing or pentesting is one of the most challenging and rewarding areas of cybersecurity. At Cover6 Solutions, we do pentesting every day and we’re ready to share our knowledge with you if you’re ready to learn!

Welcome to our all-new Pentester Prep Workshop, where you’ll be exposed to the latest tools and technologies available for offensive cyber. Our intensive two-day workshop (Saturday & Sunday 9-5 PM ET) covers everything you need to get started in the red-hot field of pentesting.

You may be brand-new to cyber or maybe you already have some experience; either way, you will be getting your hands dirty and acquiring new skills to succeed in this high-demand field. That’s right, this is a very hands-on course and we have created challenging new labs and a brand-new virtual environment that will closely simulate actual pentesting engagements. We can’t wait for you to try it, we believe this will offer the most realistic pentesting training available today!

This workshop is tailored to prepare students to pass all major pentesting certification exams, including the CompTIA Pentest+, eJPT, and the CEH Practical. The only prerequisites for this workshop are curiosity and enthusiasm: you will need both!

The provided content is listed below as a guide for the course and is subject to change. We appreciate your support and hope that you enjoy the training. We look forward to your participation and feedback as well.  

If you have any additional questions outside of the FAQs, please do not hesitate to reach out to [email protected] and we will be happy to assist you. 

Course Outline 

This course is tailored to assist with the preparation for all offensive (practical) exams. It also includes the five primary exam objectives for the CompTIA Pentest+ Certification which are: 

  1. Planning and Scoping 
  2. Information Gathering and Vulnerability Identification 
  3. Attacks and Exploits 
  4. Penetration Testing Tools 
  5. Reporting and Communication 

Please note This is NOT an official CompTIA or CEH training class, but rather a preparation course for real scenarios you may encounter in pentesting engagements or on a certification exam. Various tools, techniques, and procedures will be covered during the sessions, so those listed in the syllabus above are just examples. This material is subject to change.

 

Agenda – Day 1

  • Passive Information Gathering
  • Active Information Gathering
  • Wireshark Fundamentals
  • IPv6 Overview
  • Vulnerability Identification & Analysis
  • Common Services, Threats & Attacks
  • Exploitation
  • Post Exploitation

Agenda – Day 2

  • The Metasploit Framework
  • Privilege Escalation Techniques
  • Password Attacks
  • Antivirus & Firewall Evasion
  • Pivoting
  • Wireless Testing
  • Intro to Web Exploitation
  • Buffer Overflows
About the Instructor

Mr. Tyrone E. Wilson is a passionate information security professional with 24 years of experience in information technology and has a mission to improve as many lives as possible through education in cybersecurity. Wilson also has extensive knowledge in computer network defense, vulnerability assessments, cyber threat analysis, and incident response. Currently, Wilson is the Founder and CEO of Cover6 Solutions, LLC; which teaches companies and professionals various aspects of information security, penetration testing, and IPv6.  

Wilson is also the organizer of The D.C. Cyber Security Professionals. With over 9,000 members, it is the largest #Cybersecurity meetup group in the United States. In addition, Wilson is also on the Review Board of BSides NoVA, Howard University, and Hacker Halted and has presented and/or taught classes at many of the major tech conferences.

Tyrone E. Wilson

Founder & CEO

Upcoming Training
Workshop Location
Frequently Asked Questions (FAQ's)
  • Knowledge of operating systems, ports, and protocols is very helpful.
  • Materials to Read Ahead: It is HIGHLY RECOMMENDED that you read the background information provided in this link to have a successful Cover6 Solutions training experience – https://www.cover6solutions.com/read-ahead/.
  • To have an enjoyable hardware experience, we suggest the following:
    • Processor – 64-bit i5 or higher
    • RAM – 8 GB or higher
    • Memory – 40 GB or higher
    • Operating System – this is your choice if you are comfortable
  • On-site – Saturday & Sunday from 9 AM – 5 PM EST.
  • Virtual – Every Tuesday from 6-9 PM EST for 5 weeks.
  • Yes, the sessions are recorded and placed on the website for easy access.
  • Yes, but in a good way that will grow your skills. We recommend coming to class with a VERY open mind to the material and other participants so that the learning experience is a positive and enjoyable one. We encourage questions and getting to know other professionals who are also enrolled in the training.
  • Yes. 16 CEUs are available for this course.
  • Yes. Additionally, all alumni receive a 20% discount after completion of their first Cover6 training.
  • As always, it is up to you to “get” the job. However, Cover6 Solutions has built a platform that will assist you with viable knowledge that can be used on the job. In addition, we can assist you with resume services to showcase and enhance your newly acquired skills.
  • Absolutely! Our relationship does not end with this training. All alumni are treated like family and we will do all we can to ensure you become a successful security professional.
  • Surveys will be sent out during and after the training for you to provide your questions, comments, and concerns.
Virtual Options

Agenda – Week 1

  • Pentesting Overview & Methodologies
  • Pentest Lab Setup & Familiarization
  • Common Services, Threats & Attacks
  • IPv6 Overview

Agenda – Week 2

  • Passive Information Gathering
  • Active Information Gathering
  • Vulnerability Identification & Analysis

Agenda – Week 3

  • Exploitation
  • Privilege Escalation Techniques
  • Password Attacks
  • Pivoting

Agenda – Week 4

  • Wireshark Fundamentals
  • Wireless Testing
  • Web Application Testing

Agenda – Week 5

  • Buffer Overflows
  • Capture the Flag (CTF)