Skip to main content

Pentesting Track

Learn the art of ethical hacking.

Curriculum

  1. Reconnaissance: Passive and active enumeration.
  2. Vulnerability Scanning: Using Nessus, OpenVAS.
  3. Exploitation: Metasploit, manual exploitation.
  4. Post-Exploitation: Privilege escalation, persistence.