Description:
Covers ethical hacking basics, reconnaissance, vulnerability scanning, exploitation techniques, and reporting. Tools include Kali Linux, Metasploit, and Burp Suite.
Student Expectations:
- Understand the penetration testing methodology.
- Conduct scans and identify vulnerabilities.
- Document findings in a professional report.
Methodology:
- Labs: Virtual pentesting labs with intentionally vulnerable systems.
- Canva LMS: Step-by-step tutorials, red team vs. blue team simulations.
Course Features
- Lecture 0
- Quiz 0
- Duration 32 hours
- Skill level All levels
- Language English
- Students 0
- Assessments Yes
Curriculum
- 6 Sections
- 0 Lessons
- 32 Hours
- Module 1: Introduction to Penetration TestingEthical hacking vs malicious hacking Pen test phases (reconnaissance, scanning, exploitation, reporting) Legal and ethical considerations0
- Module 2: Tools of the TradeKali Linux overview Nmap, Wireshark, and Burp Suite Metasploit basics0
- Module 3: Reconnaissance & ScanningPassive vs active recon OSINT techniques Vulnerability scanning0
- Module 4: Exploitation TechniquesWeb application attacks (SQL injection, XSS) Network exploitation Password cracking methods0
- Module 5: Post-Exploitation & ReportingPrivilege escalation Persistence techniques Writing professional pen test reports0
- Module 6: Career Paths in PentestingRed teaming vs blue teaming Certifications (OSCP, CEH, GPEN) Building a pentesting portfolio0






