Pentesting Track
Learn the art of ethical hacking.
Curriculum
- Reconnaissance: Passive and active enumeration.
- Vulnerability Scanning: Using Nessus, OpenVAS.
- Exploitation: Metasploit, manual exploitation.
- Post-Exploitation: Privilege escalation, persistence.