Develop advanced penetration testing skills. Learn to bypass hardened security systems and exploit complex defenses.
EnrollCustom exploit development.
Bypassing modern security defenses.
Exploiting authentication and authorization flaws.
Attacking Active Directory and cloud environments.
November 18-22, 2025
10:00 AM - 6:00 PM
Virtual: Online - ET
$8495
About the PEN-300 Course.
Provided Material.
Overall Strategies for Approaching the Course.
About the PEN-300 VPN Labs.
About the OSEP Exam.
Programming Theory.
Operating System and Programming Theory.
Client-Side Code Execution with Office.
Will You Be My Dropper.
Phishing with Microsoft Office.
Keeping Up Appearances.
Executing Shellcode in Word Memory.
PowerShell Shellcode Runner.
Keep That PowerShell in Memory.
Talking to the Proxy.
Creating a Basic Dropper in JScript.
JScript and C#.
In-memory PowerShell Revisited.
Finding a Home for Our Shellcode.
DLL Injection.
Reflective DLL Injection.
Process Hollowing.
Antivirus Software Overview.
Simulating the Target Environment.
Locating Signatures in Files.
Bypassing Antivirus with Metasploit.
Bypassing Antivirus with C#.
Messing with Our Behavior.
Office Please Bypass Antivirus.
Hiding PowerShell Inside VBA.
Intel Architecture and Windows 10.
Antimalware Scan Interface.
Bypassing AMSI With Reflection in PowerShell.
Wrecking AMSI in PowerShell.
UAC Bypass vs Microsoft Defender.
Bypassing AMSI in JScript.
Application Whitelisting Theory and Setup.
Basic Bypasses.
Bypassing AppLocker with PowerShell.
Bypassing AppLocker with C#.
Bypassing AppLocker with JScript.
DNS Filters.
Web Proxies.
IDS and IPS Sensors.
Full Packet Capture Devices.
HTTPS Inspection.
Domain Fronting.
DNS Tunneling.
User Configuration Files.
Bypassing AV.
Shared Libraries.
Kiosk Enumeration.
Command Execution.
Post-Exploitation.
Privilege Escalation.
Windows Kiosk Breakout Techniques.
Local Windows Credentials.
Access Tokens.
Kerberos and Domain Credentials.
Processing Credentials Offline.
Remote Desktop Protocol.
Fileless Lateral Movement.
Lateral Movement with SSH.
DevOps.
Kerberos on Linux.
MS SQL in Active Directory.
MS SQL Escalation.
Linked SQL Servers.
AD Object Security Permissions.
Kerberos Delegation.
Active Directory Forest Theory.
Burning Down the Forest.
Going Beyond the Forest.
Compromising an Additional Forest.
Enumeration and Shell.
Attacking Delegation.
Owning the Domain.
Real Life Simulations.
Wrapping Up.
Your team deserves training as unique as they are.
Let us tailor the course to your needs at no extra cost.
Trusted by Engineers at:
and more...
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier