Curriculum
- 8 Sections
- 39 Lessons
- Lifetime
Expand all sectionsCollapse all sections
- IntroductionThis introductory module is designed to help new students get set up and acquainted with the course structure and expectations. Our goal is to ensure you have a smooth start and are fully prepared to embark on your learning journey in penetration testing.6
- Module 1: Introduction to Penetration TestingModule 1 serves as the foundational gateway into the world of penetration testing, providing students with a comprehensive overview of the field. It introduces the basic concepts and objectives of penetration testing, emphasizing its role in identifying and mitigating security vulnerabilities. Students learn about the different types of penetration testing methodologies—Black Box, White Box, and Grey Box—and when to apply each approach. The module also covers the ethical and legal considerations essential for responsible practice, highlighting the importance of operating within legal boundaries and adhering to professional standards. Through video lectures, readings on the penetration testing life cycle, and practical activities like setting up a virtual lab environment, students establish a solid base of knowledge and skills that will support their learning in subsequent modules.4
- Module 2: ReconnaissanceModule 2 delves into the essential first phase of penetration testing: reconnaissance. This module teaches students how to gather information about a target system or network using both passive and active techniques. They explore passive reconnaissance methods like Open Source Intelligence (OSINT), WHOIS lookups, and Google Dorking to collect data without directly engaging the target. Active reconnaissance is also covered, where students learn to use tools like Nmap to interact with the target and uncover network topology, open ports, and services. Through interactive demos and practical activities, students gain hands-on experience in information gathering, which is critical for identifying potential vulnerabilities. The module emphasizes the importance of thorough reconnaissance in laying a solid foundation for effective penetration testing while adhering to ethical and legal guidelines.4
- Module 3: Scanning and EnumerationModule 3 focuses on the critical processes of scanning and enumeration, building upon the information gathered during reconnaissance. In this module, students learn how to perform detailed network scanning to identify active hosts, open ports, and running services using tools like Nmap and vulnerability scanners such as OpenVAS and Nessus. They delve into service enumeration techniques to uncover specific details about system configurations and applications, which are essential for pinpointing potential vulnerabilities. Through practical exercises and demonstrations, students gain hands-on experience in systematically mapping a target network's topology and identifying weaknesses, effectively preparing them for the exploitation phase. This module enhances their technical proficiency and analytical skills, emphasizing the importance of thoroughness and accuracy in uncovering security flaws.4
- Module 4: Gaining Access (Exploitation)Module 4 delves into the exploitation phase of penetration testing, where students learn how to leverage the vulnerabilities identified during scanning and enumeration to gain unauthorized access to target systems. The module provides an in-depth exploration of common exploitation techniques, including attacks against protocols, applications and configurations. Students are introduced to the Metasploit Framework and other tools used for developing and executing exploits. Through interactive labs and hands-on exercises, they practice exploiting vulnerabilities in a controlled environment, enhancing their understanding of how attackers breach systems. This module emphasizes ethical considerations and the importance of precision, as students learn to execute exploits responsibly and effectively, setting the stage for post-exploitation activities.6
- Module 5: Post-ExploitationModule 5 explores the post-exploitation phase of penetration testing, focusing on the actions taken after initial access is gained to a target system. Students learn techniques for maintaining access, such as installing backdoors and establishing persistence mechanisms, as well as methods for privilege escalation to gain higher-level system rights. The module covers both Windows and Linux environments, highlighting the differences in post-exploitation strategies for each. Through practical demonstrations and exercises, students practice navigating compromised systems, extracting sensitive information, and understanding the potential impact of breaches. Ethical considerations are emphasized, ensuring students recognize the importance of minimizing harm and documenting actions carefully for reporting purposes. This module enhances their ability to assess the full extent of security vulnerabilities and prepares them for effective reporting and remediation discussions.6
- Module 6: Web Application Penetration TestingModule 6 focuses on the specialized field of web application penetration testing, teaching students how to identify and exploit vulnerabilities specific to web environments. The module introduces the fundamentals of web application security and delves into the OWASP Top 10, which outlines the most critical web application security risks. Students learn methodologies for testing web applications, including techniques for discovering and exploiting issues like injection flaws, authentication weaknesses, and insecure direct object references. Through interactive labs using vulnerable web applications such as DVWA or OWASP Juice Shop, they gain hands-on experience in simulating attacks and understanding their impact. This module enhances their ability to assess and secure web applications, a critical skill given the prominence of web technologies in today's digital landscape.5
- Module 7: Reporting and DocumentationModule 7 emphasizes the crucial role of reporting and documentation in the penetration testing process. Students learn how to effectively communicate their findings, including vulnerabilities discovered, exploitation methods used, and recommendations for remediation. The module covers best practices for structuring penetration testing reports, ensuring they are clear, professional, and tailored to the intended audience. Through guidance on writing executive summaries, technical details, and actionable advice, students understand how to translate technical assessments into valuable insights for stakeholders. Practical activities involve drafting reports based on simulated testing scenarios, enhancing their ability to document their work thoroughly and contribute to the improvement of organizational security postures.4
