Skip to content
Cyberforce Academy
  • Home
  • Academy
  • Playground
  • Login
  • Profile
  • Logout
  • Home
  • Training

Pentesting with Kali

Curriculum

  • 9 Sections
  • 21 Lessons
  • Lifetime
Expand all sectionsCollapse all sections
  • Module 1: Introduction to Penetration Testing
    5
    • 1.1
      What is Penetration Testing?
    • 1.2
      Ethical Hacking vs Malicious Hacking
    • 1.3
      Legal and Ethical Considerations
    • 1.4
      Overview of the Pentesting Lifecycle
    • 1.5
      Setting Expectations & Lab Safety
  • Module 2: Lab Setup & Environment
    6
    • 2.1
      Installing Virtualization Software (VirtualBox)
    • 2.2
      Setting up Kali Linux
    • 2.3
      Setting up Metasploitable
    • 2.4
      Setting up Windows 7
    • 2.5
      Network Configuration (NAT vs Bridged vs Host-Only)
    • 2.6
      Verifying Connectivity Between Machines
  • Module 3: Linux & Networking Fundamentals
    5
    • 3.1
      Basic Linux Commands (Navigation, File Management, Permissions)
    • 3.2
      Understanding Users & Privileges
    • 3.3
      Networking Basics (IP, Subnets, Ports, Protocols)
    • 3.4
      TCP/IP Model Explained
    • 3.5
      Introduction to Common Network Services
  • Module 4: Reconnaissance & Scanning
    5
    • 4.1
      Passive vs Active Recon
    • 4.2
      Network Scanning Concepts
    • 4.3
      Using Nmap for Host Discovery & Port Scanning
    • 4.4
      Service Identification
    • 4.5
      Practical: Scan Metasploitable
  • Module 5: Enumeration & Vulnerabilities
    0
    • Module 6: Exploitation with Metasploit
      0
      • Module 7: Post-Exploitation & Shells
        0
        • Module 8: Web Vulnerabilities (Intro)
          0
          • Module 9: Reporting & Final Project
            0
            This content is protected, please login and enroll in the course to view this content!
            What is Penetration Testing?
            Prev
            Legal and Ethical Considerations
            Next
            Designed by Nasio Themes || Powered by WordPress