Network Penetration Testing Course Syllabus

  1. Module 01: Introduction

    Overview of Network Penetration Testing and its importance in cybersecurity.

  2. Module 02: Command Line Fun

    Getting familiar with command line tools and basic commands in network penetration testing.

  3. Module 03: Getting Comfortable with Kali Linux

    Setting up and using Kali Linux, the go-to OS for penetration testing.

  4. Module 04: Practical Tools

    Exploring the key tools used in penetration testing and how to use them effectively.

  5. Module 05: Passive Recon

    Conducting passive reconnaissance to gather information without interacting directly with the target.

  6. Module 06: Active Recon

    Performing active reconnaissance to directly engage with the target network.

  7. Module 07: Scanning Network

    Techniques for scanning networks to identify live hosts, open ports, and services.

  8. Module 08: Services Enumeration

    Enumerating services running on a target system and identifying potential weaknesses.

  9. Module 09: Vulnerability Scanning

    Using vulnerability scanning tools to identify weaknesses in the network and systems.

  10. Module 10: Vulnerability Exploitation

    Exploiting vulnerabilities to gain unauthorized access to systems and networks.

  11. Module 11: Getting Public Exploits

    Using public exploits to target known vulnerabilities in a controlled environment.

  12. Module 12: Exploit Fixing

    Understanding how to mitigate and fix vulnerabilities after exploitation.

  13. Module 13: Gaining Shell

    Techniques for gaining a shell on a target system to execute further commands.

  14. Module 14: Password Attacks

    Exploring password attacks including brute force, dictionary attacks, and rainbow tables.

  15. Module 15: Windows Privilege Escalation

    Techniques for escalating privileges on Windows systems to gain administrative access.

  16. Module 16: Linux Privilege Escalation

    Methods for escalating privileges on Linux systems to root access.

  17. Module 17: Metasploit Framework

    Introduction to the Metasploit Framework and how it can be used for penetration testing.

  18. Module 18: Bash Scripting

    Learning how to write and use bash scripts for automating tasks in penetration testing.

  19. Module 19: File Transfer

    Techniques for transferring files between systems securely during penetration tests.

  20. Module 20: Introduction to Buffer Overflow

    Understanding the basics of buffer overflow vulnerabilities and their exploitation.

  21. Module 21: CTF – Practice

    Capture the Flag (CTF) exercises to practice and test the skills learned throughout the course.