# TCM - Practical Ethical Hacking

![Practical Ethical Hacking - academy.tcm-sec.com - © TCM Security](https://1178537843-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F2KUxfxUFmy000PDT7MtM%2Fuploads%2Fgit-blob-286a05cd92cffa0515118b9f6a001463b07cdf9a%2Fpeh.png?alt=media\&token=b61bc15f-583d-4ac3-ac04-f50ca139fc19)

## [PEH](https://academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course) Course Goals and Objectives

* Learn the practical ethical hacking
* Internal and external network penetration testing
* Wireless Pentesting
* Web App Pentesting
* Study for the **PNPT** Certification

## Course duration & Topics

\~ 25 hours

1. [Introduction & Networking](https://blog.syselement.com/tcm/courses/peh/1-intro)
2. [Lab Set Up, Linux & Python](https://blog.syselement.com/tcm/courses/peh/2-lab)
3. [The Ethical Hacker Methodology](https://blog.syselement.com/tcm/courses/peh/3-eth-hack)
4. [Active Directory](https://blog.syselement.com/tcm/courses/peh/4-active-directory)
5. [Post Exploitation](https://blog.syselement.com/tcm/courses/peh/5-post-exploitation)
6. [Web Application](https://blog.syselement.com/tcm/courses/peh/6-webapp)
7. [Wireless Attacks](https://blog.syselement.com/tcm/courses/peh/7-wireless)
8. [Legal Documentation & Report Writing](https://blog.syselement.com/tcm/courses/peh/8-report)

Instructor: [Heath Adams - The Cyber Mentor](https://www.thecybermentor.com/)

## Useful links and resources

* Where to find the [Practical Ethical Hacking - The Complete Course](https://academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course) course? - [TCM Academy Courses](https://academy.tcm-sec.com/courses)
* TCM discord channel - [TCM Security Discord](https://discord.gg/tcm)
* **Practical Network Penetration Tester** Certification - [PNPT](https://certifications.tcm-sec.com/pnpt/)
* 🔬 For the **training** part I will use my home lab environment
* [My PEH references](https://blog.syselement.com/tcm/courses/peh/peh-references)

> #### ❗ Disclaimer
>
> * **Do not use the covered attacks and techniques on real IP addresses, hosts or networks without proper authorization!**

***
