This instructor-led training (ILT) course equips students with the knowledge and skills needed to effectively test and secure iOS applications.
This instructor-led training (ILT) course equips students with the knowledge and skills needed to effectively test and secure Android applications.
This instructor-led training will help you master Azure and EntraID security and apply red teaming tactics.
This instructor-led training covers the basics to expert level, helping validate your expertise in AWS security.
In partnership with:
In partnership with:
By partnering with leading platforms like Hack The Box, or collaborating with world-class instructors we have created cutting-edge, instructor-led cybersecurity courses based on industry-ready standards that are highly interactive, hands-on, and offer actionable knowledge to your team.
Purple teaming brings together the strengths of both red and blue teams to ensure your defense is as robust as it can be. Secure your infrastructure and outsmart cyber threats with a tailored strategy.
Boost your organization’s defenses with custom-designed cybersecurity training tailored to your industry standards. From beginner-level awareness to advanced threat detection and response, we develop training that meets your unique compliance requirements and security challenges.
This course supports professionals looking to build advanced Active Directory attack capabilities through structured methodology, guided hands-on labs, and focused development of modern AD exploitation techniques.
Fill in the following form to get course updates & enrollment info.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
In collaboration with:
This training is delivered through custom-built, guided training by Cyber Helmets, enriched with Hack The Box Academy’s sophisticated labs and curated content.
What you’ll gain:

Level:
Intermediate to
Advanced

Duration:
8 weeks
(8h/week)
Who this course is designed for
This course supports professionals looking to build advanced Active Directory attack capabilities through structured methodology, guided hands-on labs, and focused development of modern AD exploitation techniques.
Red Teamers & pentesters ready to specialise in AD attack-chains
Blue-team or SOC practitioners who want to deepen attacker mindset in Active Directory
Security consultants focused on internal network and AD compromise scenarios
Security engineers who already know the basics and are ready for real domain-wide challenge
HTB Certified Active Directory Pentesting Expert
(HTB CAPE)
The HTB CAPE certification builds elite-level Active Directory penetration-testing capability through expertly crafted training by Cyber Helmets (in partnership with Hack The Box). Participants follow the AD Attack job-role path in HTB Academy, complete immersive labs, and pass a full practical exam simulating enterprise-style AD compromise, covering kerberoasting, AS-REP/NTLM abuse, trust-pivoting, ADCS/WSUS exploitation, Exchange/AD hybrid, and large-scale domain lateral movement and domain controller takeover.
> Advanced Active Directory enumeration & attack surface mapping
> Kerberos & NTLM exploitation techniques (AS-REP Roast, Kerberoast, etc.)
> ADCS/WSUS/Exchange abuse, hybrid-cloud AD pivoting
> Trusts & forest compromise, lateral-movement at scale
> Post-exploitation domain-wide control, evasion, red-team operations
> Reporting & evidence-based deliverables for professional engagements
>Instructor-led live online sessions aligned to real pentesting methodology
> Access to HTB labs
> Exam voucher includes two (2) exam attempts.
> Course materials such as slides, links to further reading, code snippets, lab exercises, etc.
> HTB Active Directory Pentesting Expert Certification after successfully passing the exam.
Accordion Content
A certification is not a mandatory prerequisite to become an Active Directory Penetration Tester or practice any other cybersecurity role, but a great asset if you are looking to learn new skills in a structured way and prove your knowledge to potential employers.
Hack The Box is a trusted, highly respected, and community-backed IT security training vendor, with a long history in the domain. The training standards of the company are set quite high and this applies to all offerings, machines, challenges, Pro Labs, and now, the certifications.
Through the years, Hack The Box has been a training partner of major organisations, government/military agencies, and academic institutions worldwide. We plan to continue being a trusted training partner, and also provide certification services from now on, while retaining the same level of content-excellence, quality, and integrity.
To prepare effectively for the HTB CAPE program, consider the following recommendations:
Access to HTB Academy’s content is vital for your participation in this course. A discount voucher will be provided to you upon registration via e-mail, which you can use to activate your subscription to HTB Academy.
The following modules are specifically chosen to provide a strong foundational understanding and skill set, which are critical for your success in the seminar and future endeavors in penetration testing:
1. Introduction to Academy: This module provides an overview of the Academy platform and guides on how to effectively utilize it for self-training, setting the foundation for your learning journey.
2. Linux Fundamentals: Essential for cybersecurity, this module offers in-depth training in Linux, covering its structure, shell usage, and system administration, complete with practical exercises and an assessment to solidify your understanding.
3. Learning Process: Focusing on the learning journey, this module covers aspects such as mindset, efficiency, organization, and coping with frustration, crucial for excelling in the information security field.
Unfortunately we don’t record our sessions therefore you’ll need to catch up with the rest of the group. The support team can help you to catch up with the previous sessions and guide you on the materials that you need to read.
To obtain the HTB Certified Active Directory Exploitation (HTB CAPE) certification, all individuals must complete the entire Active Directory Penetration Tester job-role path, which consists of 15 comprehensive modules. Each module includes hands-on exercises and a skills assessment at the end, designed to validate your understanding of the covered topics. Completing these modules is a mandatory step before being eligible to take the certification exam.
For those subscribed to the Gold Annual certification, solutions for the modules are provided. This ensures the learning process is more guided and efficient, reducing unnecessary frustration while allowing candidates to focus on mastering the content. This subscription makes completing the modules a manageable and rewarding experience.
Find below the facts that differentiate HTB Certified Active Directory Pentesting Expert (HTB CAPE) from standard certifications::
Continuous Evaluation – To be eligible to start the examination process, one must have completed all modules of the “Active Directory Penetration Tester” job-role path 100% first. Each module in the path comes with its own hands-on skills assessment at the end that students must complete to prove their understanding of the presented topics. The answers to the skills assessment exercises are not provided. Evaluation takes place throughout the journey, not only during the examination!
Hands-on & Real-world Exam Environment – HTB Certified Active Directory Pentesting Expert (HTB CAPE) candidates must perform advanced Active Directory penetration tests in realistic Active Directory environments, encompassing real-world Active Directory environments, demanding a full understanding of how Windows and the Active Directory environments work and assessing the candidate’s ability to execute complex attacks without relying on multiple-choice questions!
Focus on Advanced & Applicable Skills – The “Active Directory Penetration Tester” job-role path advances the competencies acquired in the “Penetration Tester” job-role path. It emphasizes the development of sophisticated skills crucial for Active Directory exploitation. The curriculum emphasizes practical, high-stakes scenarios involving Active Directory enumeration, exploiting trust relationships, misconfigured DACLs, and leveraging specialized tools. This path is enriched with practical demonstrations encompassing a wide range of contemporary Windows and Active Directory implementations, allowing them to understand Active Directory authentication protocols deeply.
Outside-the-box Thinking – HTB Certified Active Directory Pentesting Expert (HTB CAPE) candidates will be required to think outside the box and utilize the various skills and techniques they learned throughout the path to achieving the exam’s objectives. Like in real-world engagements, creativity and in-depth knowledge will be necessary for a successful outcome.
Commercial-grade Report Requirement – Successfully attacking and exploiting a complex Active Directory environment is not enough to obtain the HTB Certified Active Directory Pentesting Expert (HTB CAPE) certification. As part of their assessment, candidates must explain the process of identifying and exploiting vulnerabilities. Additionally, candidates are expected to propose remediation for identified vulnerabilities. HTB Certified Active Directory Pentesting Expert (HTB CAPE) candidates must prove they are market-ready and client-centric professionals.
Seamless Experience Powered By Pwnbox – The entire exam and certification process can be conducted through the candidates’ browser from start to finish. All penetration test attacks can be performed via the provided and in-browser Pwnbox. There are no infrastructural or tool requirements.
HTB certifications are on Credly!
By the time you successfully complete the HTB CAPE exam and claim your certificate, HTB CAPE’s digital badge will arrive on your email. Accept it and share it on your social media, so that third parties can verify your obtained skills!
To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.
Syllabus:
Intro to GCP
Exploitation of GCP Services
Methodologies
Security Services
Syllabus:
Intro to AWS
Exploitation of AWS Services
Methologies
Common Detection Mechanisms
Syllabus:
Azure Basics
Exploitation of Azure Services
Methologies
Common Detection Mechanisms
Fundamentals and Setup
Advanced Techniques and Practical Application
Advanced Techniques and Practical Application
Fundamentals & Setup