Curriculum
- 12 Sections
- 44 Lessons
- Lifetime
Expand all sectionsCollapse all sections
- Module 1: Foundations & Lab SetupLearners gain fluency in essential networking principles, ensuring they can navigate IP addressing, routing, and key protocols (TCP, UDP, HTTP, DNS, etc.) with confidence. This module also covers advanced Open Source Intelligence (OSINT) techniques, teaching participants how to gather detailed insights from public data sources. Students practice locating critical metadata, scouring social media, and utilizing custom scanning scripts while continuously honing skills in stealth and ethical boundaries.5
- Module 2: Reporting & Executive CommunicationAs students approach the culmination of their learning, the spotlight shifts to generating professional-grade pentest documentation. They practice structuring detailed vulnerability reports, risk prioritization, and remediation roadmaps. Furthermore, they learn to craft executive summaries that translate technical findings into strategic, business-relevant insights. Through peer review sessions and mentor feedback, participants refine their writing, presentation, and persuasion skills, ensuring they can effectively communicate with a broad range of stakeholders.3
- Module 3: Networking Fundamentals & OSINTAfter covering the basics, learners deepen their understanding of reconnaissance, moving beyond simple scanning methods. They explore advanced open-source intelligence (OSINT) tactics, metadata analysis, and custom script development. Strategies for evading detection—such as circumventing Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and honeypots—are examined in depth. Through practical exercises, students gather intelligence on a simulated corporate network, applying ethical limits to ensure safe and responsible information gathering.3
- Module 4: Reconnaissance & Target ProfilingBuilding on OSINT, participants dive deeper into active reconnaissance strategies tailored for modern enterprise environments. They learn to map large-scale networks, evade Intrusion Detection Systems (IDS), and identify honeypots. In-depth labs guide students through analyzing complex topologies, interpreting port scan data, and discovering hidden services. Special attention is given to advanced DNS enumeration, banner grabbing, and pivot-based reconnaissance in segmented networks.3
- Module 5: Network Exploits & Evasion TechniquesFocusing on network-layer attacks, this module explores classic and emerging exploits used against common services and protocols. Students learn how threat actors bypass firewalls and intrusion prevention solutions through fragmentation, tunneling, and encryption-based stealth. They also practice forging traffic and using custom-coded payloads to slip past network defenses. By dissecting real-world case studies of network breaches, learners gain insight into practical evasion tactics used by adversaries.3
- Module 6: Vulnerability Analysis & Automation ToolsIn addition to relying on automated tools—such as Nessus, OpenVAS, and custom scanners—students develop an understanding of manual verification methods to reduce false positives. They learn how to integrate scan results into vulnerability databases, assign accurate risk scores, and prioritize findings for exploitation. The labs help learners create efficient scanning workflows, combine multiple tool outputs, and document vulnerabilities in a standardized format.4
- Module 7: Exploit Development (Buffer Overflows & Shellcoding)In this advanced sequel, participants tackle modern defense mechanisms such as Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP), and Control Flow Guard (CFG). They refine their exploit code to circumvent these protections, using return-oriented programming (ROP) and other sophisticated techniques. Through guided lab exercises, learners gain the experience needed to modify publicly available exploits for real-world scenarios and strengthen their reverse-engineering and debugging capabilities.4
- Module 8: Post-Exploitation & Advanced Lateral MovementShifting focus to the post-exploitation phase, this module examines how attackers solidify their foothold, escalate privileges, and move laterally in compromised networks. Participants study various persistence methods, including services, scheduled tasks, and kernel-level backdoors, on both Windows and Linux systems. In addition, they test multi-stage attacks using proxy chains, SSH tunneling, and custom pivot scripts. Realistic lab environments present segmented networks and Active Directory setups, challenging students to maintain stealth as they traverse different trust boundaries.4
- Module 9: Web & Application PentestingThis first deep dive into web security covers essential concepts from the OWASP Top 10, including SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), and insecure direct object references (IDOR). Students learn how to intercept and manipulate traffic using Burp Suite, methodically test authentication and session management, and identify common misconfigurations. Labs feature vulnerable web applications that reinforce systematic testing processes and the creation of detailed proof-of-concept exploits.6
- 9.1OWASP Top 10 Overview
- 9.2Session Management and Authentication Flaws in Web Applications
- 9.3Analyzing Server Responses and Hidden Parameters for Potential Vulnerabilities
- 9.4Identifying and Testing Common Misconfigurations (File Uploads, Path Traversal)
- 9.5Exploit Tutorials on the OWASP Top 10
- 9.6Performing Web Penetration Test – Exercises
- Module 10: Cloud Attacks & Container SecurityMoving into the cloud, participants learn to analyze misconfigurations in popular platforms (AWS, Azure, GCP) and examine Identity and Access Management (IAM) pitfalls. Detailed labs reveal how attackers exploit overly permissive roles, exposed secrets, and unprotected storage buckets. Container security is explored more extensively, covering escape techniques, insecure registry setups, and cluster misconfigurations in orchestrators like Kubernetes. By the end, learners can effectively uncover security lapses within modern, containerized infrastructures.5
- 10.1Overview of Cloud Service Models (IaaS, PaaS, SaaS) and Their Attack Surfaces
- 10.2Common Misconfigurations in AWS, Azure, and GCP (IAM Roles, Storage Buckets)
- 10.3Container Security Principles (Docker, Kubernetes) and Common Weak Points
- 10.4Strategies for Detecting and Exploiting Insecure Container Registries
- 10.5Performing Cloud Penetration Test – Exercises
- Module 11: Capstone Project (Extended Engagement)To solidify and showcase their expanded knowledge, students undertake an extended Capstone Project spanning multiple modules. In a fully simulated environment, they conduct a complete penetration test that integrates all learned concepts—from recon and exploitation to post-exploitation, lateral movement, and reporting. This includes a strong emphasis on advanced or novel threat scenarios, such as container breakouts or targeted social engineering. Regular mentor check-ins and peer collaboration foster continuous improvement and reflection.2
- Module 12: Capstone Presentation & Next StepsIn the concluding module, participants present their Capstone findings, offering detailed walk-throughs of their engagements and discussing remediation recommendations. This final stage features constructive critiques from instructors, enabling students to finalize their reports and sharpen their communication prowess. The course concludes with guidance on career advancement, certification options, and professional networking opportunities. Graduates leave equipped not only with comprehensive pentesting expertise but also with a robust portfolio piece and the confidence to excel in a rapidly evolving cybersecurity landscape.2
