This instructor-led training (ILT) course equips students with the knowledge and skills needed to effectively test and secure iOS applications.
This instructor-led training (ILT) course equips students with the knowledge and skills needed to effectively test and secure Android applications.
This instructor-led training will help you master Azure and EntraID security and apply red teaming tactics.
This instructor-led training covers the basics to expert level, helping validate your expertise in AWS security.
In partnership with:
In partnership with:
By partnering with leading platforms like Hack The Box, or collaborating with world-class instructors we have created cutting-edge, instructor-led cybersecurity courses based on industry-ready standards that are highly interactive, hands-on, and offer actionable knowledge to your team.
Purple teaming brings together the strengths of both red and blue teams to ensure your defense is as robust as it can be. Secure your infrastructure and outsmart cyber threats with a tailored strategy.
Boost your organization’s defenses with custom-designed cybersecurity training tailored to your industry standards. From beginner-level awareness to advanced threat detection and response, we develop training that meets your unique compliance requirements and security challenges.
A practical, expert-led course that takes you beyond theory and into hands-on, professional-grade penetration testing.
Fill in the following form to get course updates & enrollment info.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
In collaboration with:
This training is delivered through custom-built, guided training by Cyber Helmets, enriched with Hack The Box Academy’s sophisticated labs and curated content.
What you’ll gain:

Level:
Entry to
Intermediate

Duration:
6 weeks
(8h/week)
Who this course is designed for
This course supports professionals seeking advanced penetration-testing capabilities through structured methodology, hands-on lab practice, and expert guidance. Ideal for those moving into offensive-security roles, enhancing blue-team insight through attacker techniques, or preparing for a tested and respected certification in pentesting.
Professionals moving into penetration testing or offensive security roles and seeking real-world, skills-based validation
Blue-team or SOC analysts who want to strengthen defenses through attacker methodology and practical lab experience
Security analysts transitioning into red teaming and looking for hands-on pentesting training that follows a structured, end-to-end workflow used in live engagements
Security practitioners looking for hands-on pentesting training that follows a structured, end-to-end workflow used in live engagements
HTB Certified Penetration Testing Specialist
(HTB CPTS)
The HTB CPTS certification builds practical penetration-testing capability through expertly designed training provided by Cyber Helmets in collaboration with Hack The Box. Participants progress through the Penetration Tester path in HTB Academy and complete a full practical assessment in an enterprise-style environment, covering reconnaissance, web and infrastructure exploitation, Active Directory pivoting, lateral spread, privilege escalation, and professional-grade reporting. The program validates the ability to execute real-world attack chains with structure, evidence, and technical depth.
> Penetration testing processes and methodologies
> Information gathering & reconnaissance techniques
> Attacking Windows & Linux targets
> Active Directory penetration testing
> Web application penetration testing
> Manual & automated exploitation
> Vulnerability assessment
> Pivoting & Lateral Movement
> Post-exploitation enumeration
> Windows & Linux Privilege escalation
> Vulnerability/Risk communication and reporting
>Instructor-led live online sessions aligned to real pentesting methodology
> Access to HTB labs
> Exam voucher includes two (2) exam attempts.
> Course materials such as slides, links to further reading, code snippets, lab exercises, etc.
> HTB Penetration Testing Specialist Certification after successfully passing the exam.
Accordion Content
A certification is not a mandatory prerequisite to become a Penetration Tester or practice any other cybersecurity role, but a great asset if you are looking to learn new skills in a structured way and prove your knowledge to potential employers. Here is our take:
A certification is not a mandatory prerequisite to become a Bug Bounty Hunter or practice any other cybersecurity role, but a great asset if you are looking to learn new skills in a structured way and prove your knowledge to potential employers. Here is our take:
Hack The Box is a trusted, highly respected, and community-backed IT security training vendor, with a long history in the domain. The training standards of the company are set quite high and this applies to all offerings, machines, challenges, Pro Labs, and now, the certifications.
Through the years, Hack The Box has been a training partner of major organisations, government/military agencies, and academic institutions worldwide. We plan to continue being a trusted training partner, and also provide certification services from now on, while retaining the same level of content-excellence, quality, and integrity.
To prepare effectively for the CBBH program, consider the following recommendations:
Academy Modules Review:
Review the “Introduction to Academy” module
Go through the “Getting Started” module
While a programming background is not required, it can be beneficial. The course will introduce some scripting and automation techniques, but these are explained from the ground up, making it accessible even to those with limited programming experience.
Prerequisites for successful certification include:
Participants have access to a dedicated support team for any technical issues, as well as access to instructors during designated office hours for questions related to the course material. Additionally, you can reach out to your instructor during office hours for personalized assistance.
The course includes simulated real-world scenarios in a controlled lab environment. You will not be conducting tests on live, unauthorized systems, but you will gain the skills needed to perform real-world penetration tests in a professional setting.
Unfortunately we don’t record our sessions therefore you’ll need to catch up with the rest of the group. The support team can help you to catch up with the previous sessions and guide you on the materials that you need to read.
Yes, you can access all Tier 0 modules of the Penetration Tester job-role path completely free of charge. This means that you can start the path for free, and once you get going and feel like the rest of the path suits your learning objectives, you can choose any of the available pricing options.
No, all individuals who desire to obtain HTB CPTS must complete the entire Penetration Tester job-role path, which consists of 28 modules. Each module comes with its own hands-on exercises and skills assessment (at the end) that you must complete to prove your understanding of the presented topics, before going for the exam.
HTB certifications are on Credly! By the time you successfully complete the HTB CPTS exam and claim your certificate, CPTS’s digital badge will arrive on your email. Accept it and share it on your social media, so that third parties can verify your obtained skills!
To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.
Syllabus:
Intro to GCP
Exploitation of GCP Services
Methodologies
Security Services
Syllabus:
Intro to AWS
Exploitation of AWS Services
Methologies
Common Detection Mechanisms
Syllabus:
Azure Basics
Exploitation of Azure Services
Methologies
Common Detection Mechanisms
Fundamentals and Setup
Advanced Techniques and Practical Application
Advanced Techniques and Practical Application
Fundamentals & Setup