Skip to content
Cyberforce Academy
Home
Academy
Playground
Login
Profile
Logout
Home
Training
Pentesting with Kali
Curriculum
9 Sections
21 Lessons
Lifetime
Expand all sections
Collapse all sections
Module 1: Introduction to Penetration Testing
5
1.1
What is Penetration Testing?
1.2
Ethical Hacking vs Malicious Hacking
1.3
Legal and Ethical Considerations
1.4
Overview of the Pentesting Lifecycle
1.5
Setting Expectations & Lab Safety
Module 2: Lab Setup & Environment
6
2.1
Installing Virtualization Software (VirtualBox)
2.2
Setting up Kali Linux
2.3
Setting up Metasploitable
2.4
Setting up Windows 7
2.5
Network Configuration (NAT vs Bridged vs Host-Only)
2.6
Verifying Connectivity Between Machines
Module 3: Linux & Networking Fundamentals
5
3.1
Basic Linux Commands (Navigation, File Management, Permissions)
3.2
Understanding Users & Privileges
3.3
Networking Basics (IP, Subnets, Ports, Protocols)
3.4
TCP/IP Model Explained
3.5
Introduction to Common Network Services
Module 4: Reconnaissance & Scanning
5
4.1
Passive vs Active Recon
4.2
Network Scanning Concepts
4.3
Using Nmap for Host Discovery & Port Scanning
4.4
Service Identification
4.5
Practical: Scan Metasploitable
Module 5: Enumeration & Vulnerabilities
0
Module 6: Exploitation with Metasploit
0
Module 7: Post-Exploitation & Shells
0
Module 8: Web Vulnerabilities (Intro)
0
Module 9: Reporting & Final Project
0
This content is protected, please
login
and
enroll
in the course to view this content!
Search Here...