• To ensure you get the most out of your CIN membership and stay connected with the latest updates, we are asking all members to update their community profiles. Please take a few moments to log in and: • Complete all sections of your profile • Review your current information for accuracy • Enter an alternative email address if desired (CIN requires your valid business email address for your training organization). Keeping your profile up to date helps us better serve you, ensures your account is correctly linked with CompTIA’s CRM, streamlines processes, enhances communication, and guarantees you never miss out on valuable CIN opportunities. Thank you for taking this important step! step!

Pentest+ delivery Firebrand training

Yes I have, the labs are key to the course. I've taught Pentest+ to students who have very little real experience and zero professional experience. For that I try to move a bit faster through the theory so we can do the Cert Master Labs and delve into the Try Hack Me Pentest+ Path so they get their hands dirty. I do that in college courses that deal with security and incident response and it works wonders. Those questions where you have to identify stuff by viewing code will be answered easier if the have worked with code (python, bash, power shell) and tools like wireshark, nmap, winpeas etc....