Network Penetration Testing Course Syllabus
-
Module 01: Introduction
Overview of Network Penetration Testing and its importance in cybersecurity.
-
Module 02: Command Line Fun
Getting familiar with command line tools and basic commands in network penetration testing.
-
Module 03: Getting Comfortable with Kali Linux
Setting up and using Kali Linux, the go-to OS for penetration testing.
-
Module 04: Practical Tools
Exploring the key tools used in penetration testing and how to use them effectively.
-
Module 05: Passive Recon
Conducting passive reconnaissance to gather information without interacting directly with the target.
-
Module 06: Active Recon
Performing active reconnaissance to directly engage with the target network.
-
Module 07: Scanning Network
Techniques for scanning networks to identify live hosts, open ports, and services.
-
Module 08: Services Enumeration
Enumerating services running on a target system and identifying potential weaknesses.
-
Module 09: Vulnerability Scanning
Using vulnerability scanning tools to identify weaknesses in the network and systems.
-
Module 10: Vulnerability Exploitation
Exploiting vulnerabilities to gain unauthorized access to systems and networks.
-
Module 11: Getting Public Exploits
Using public exploits to target known vulnerabilities in a controlled environment.
-
Module 12: Exploit Fixing
Understanding how to mitigate and fix vulnerabilities after exploitation.
-
Module 13: Gaining Shell
Techniques for gaining a shell on a target system to execute further commands.
-
Module 14: Password Attacks
Exploring password attacks including brute force, dictionary attacks, and rainbow tables.
-
Module 15: Windows Privilege Escalation
Techniques for escalating privileges on Windows systems to gain administrative access.
-
Module 16: Linux Privilege Escalation
Methods for escalating privileges on Linux systems to root access.
-
Module 17: Metasploit Framework
Introduction to the Metasploit Framework and how it can be used for penetration testing.
-
Module 18: Bash Scripting
Learning how to write and use bash scripts for automating tasks in penetration testing.
-
Module 19: File Transfer
Techniques for transferring files between systems securely during penetration tests.
-
Module 20: Introduction to Buffer Overflow
Understanding the basics of buffer overflow vulnerabilities and their exploitation.
-
Module 21: CTF – Practice
Capture the Flag (CTF) exercises to practice and test the skills learned throughout the course.