About Course
This course will teach you how to perform penetration testing on websites and web applications, identify vulnerabilities, exploit them, and secure web servers. You will get hands-on experience with tools like Kali Linux, Metasploit, Nmap, and others for conducting penetration testing.
Learn penetration testing techniques and exploit vulnerabilities in web applications and websites.
Requirements
- ✓Basic knowledge of networking and web technologies.
- ✓Basic understanding of operating systems, especially Linux.
- ✓A computer with internet access.
- ✓Willingness to learn penetration testing techniques and ethical hacking.
Course Curriculum
Section 1: Introduction
1. Introduction to Penetration Testing for Beginners Course
2. What is Penetration Testing
3. Why perform a Penetration Test
4. Need to know basic terms
5. Vulnerability Assessments vs Penetration Test
Assessment Exercise- 01
Section 2: Types of Penetration Testing
6. Knowledge of the target
7. Penetration testing types based on the position of tester
8. Penetration testing types based on where it is performed
Assessment Exercise- 02
Section 3: How to create Penetration Testing Lab Setup Lab Environment and Basic commands
9. Penetration Testing Process
10. How to Create Penetration Testing Lab Setup
11. How to Install VirtualBox Lab Setup for Penetration Testing
12. How to Install Kali Linux Lab Setup for Penetration Testing
13. How to Install Metasploitable2 Lab Setup for Penetration Testing
14. How to Install Windows Lab Setup for Penetration Testing
Assessment Exercise- 03
Section 4: Reconnaissance and Planning - Penetration Testing
15. Learn basic commands Linux for Beginners
16. Introduction to Reconnaissance and Planning
17. Passive Reconnaissance
18. Whois and domain information
19. Email harvesting
20. Website source code and Website mirroring
21. Find Social Media accounts Information gathering
22. Information gathering through Job posting and Resumes
23. How to identify Web Application Firewall
Assessment Exercise- 04
Section 5: Scanning and Discovery - Penetration Testing
24. OSINT Framework
25. What is Active Reconnaissance
26. TCP 3 Way Handshake and TCP Flags
27. Active Reconnaissance Tools
28. Active Reconnaissance LAB Scenario
29. NMAP LAB over the internet1
30. NMAP LAB on Local Network
31. NMAP LAB Vulnerability scanning using scripts
Assessment Exercise- 05
Section 6: Exploitation - Penetration Testing
32. Exploiting FTP Port 21 Kali Linux Metasploitable2 Lab
33. Exploiting SSH 22 Kali Linux Metasploitable2 Lab
34. Exploiting Telnet 23 Kali Linux Metasploitable2 Lab
35. Exploiting SMTP Port 25 Kali Linux Metasploitable2 Lab
36. Exploiting HTTP Port 80 Kali Linux Metasploitable2 Lab
37. Exploiting SMB 139 and 445 Kali Linux Metasploitable2 Lab
38. Exploiting BindShell Port 1524 Kali Linux Metasploitable2 Lab
39. Exploiting MySQL port 3306 Kali Linux Metasploitable2 Lab
40. Exploiting VNC port 5900 Kali Linux Metasploitable2 Lab
41. Exploiting Tomcat port 8180 Kali Linux Metasploitable2 Lab
42. Exploiting Windows 10 Kali Linux Windows Lab
43. Exploiting Linux Kali Linux Linux Lab
Assessment Exercise- 06
Section 7: Maintaining Access Penetration Testing
44. Maintaining Access
45. How to create backdoor for Windows Kali Linux Windows Lab
46. How to hack any Android Phone Kali Linux Android Lab
Assessment Exercise- 07
Section 8: Clearing Tracks and Report Generation - Penetration Testing
47. How to clear tracks
48. Clearing Tracks on Windows
49. Clearing Tracks on Linux
50. Report Generation
Assessment Exercise- 08
Section 9: Final Exam
Final Exam
What You Will Learn
- ✓Learn penetration testing basics and how to identify vulnerabilities.
- ✓Set up a penetration testing lab using Kali Linux and Metasploit.
- ✓Perform reconnaissance and scanning to gather information on targets.
- ✓Use tools like Nmap and Metasploit for vulnerability scanning and exploitation.
- ✓Understand and apply various attack techniques like SQL injection, XSS, and others.
- ✓Learn how to maintain access, clear tracks, and generate reports for penetration testing.
- ✓Master ethical hacking practices to ensure responsible testing and security improvement.