About Course
This course will teach you how to perform penetration testing on websites and web applications, identify vulnerabilities, exploit them, and secure web servers. You will get hands-on experience with tools like Kali Linux, Metasploit, Nmap, and others for conducting penetration testing.
Learn penetration testing techniques and exploit vulnerabilities in web applications and websites.
Requirements
- Basic knowledge of networking and web technologies.
- Basic understanding of operating systems, especially Linux.
- A computer with internet access.
- Willingness to learn penetration testing techniques and ethical hacking.
Course Curriculum
Section 1: Introduction
- 1. Introduction to Penetration Testing for Beginners Course
- 2. What is Penetration Testing
- 3. Why perform a Penetration Test
- 4. Need to know basic terms
- 5. Vulnerability Assessments vs Penetration Test
- Assessment Exercise- 01
Section 2: Types of Penetration Testing
- 6. Knowledge of the target
- 7. Penetration testing types based on the position of tester
- 8. Penetration testing types based on where it is performed
- Assessment Exercise- 02
Section 3: How to create Penetration Testing Lab Setup Lab Environment and Basic commands
- 9. Penetration Testing Process
- 10. How to Create Penetration Testing Lab Setup
- 11. How to Install VirtualBox Lab Setup for Penetration Testing
- 12. How to Install Kali Linux Lab Setup for Penetration Testing
- 13. How to Install Metasploitable2 Lab Setup for Penetration Testing
- 14. How to Install Windows Lab Setup for Penetration Testing
- Assessment Exercise- 03
Section 4: Reconnaissance and Planning - Penetration Testing
- 15. Learn basic commands Linux for Beginners
- 16. Introduction to Reconnaissance and Planning
- 17. Passive Reconnaissance
- 18. Whois and domain information
- 19. Email harvesting
- 20. Website source code and Website mirroring
- 21. Find Social Media accounts Information gathering
- 22. Information gathering through Job posting and Resumes
- 23. How to identify Web Application Firewall
- Assessment Exercise- 04
Section 5: Scanning and Discovery - Penetration Testing
- 24. OSINT Framework
- 25. What is Active Reconnaissance
- 26. TCP 3 Way Handshake and TCP Flags
- 27. Active Reconnaissance Tools
- 28. Active Reconnaissance LAB Scenario
- 29. NMAP LAB over the internet1
- 30. NMAP LAB on Local Network
- 31. NMAP LAB Vulnerability scanning using scripts
- Assessment Exercise- 05
Section 6: Exploitation - Penetration Testing
- 32. Exploiting FTP Port 21 Kali Linux Metasploitable2 Lab
- 33. Exploiting SSH 22 Kali Linux Metasploitable2 Lab
- 34. Exploiting Telnet 23 Kali Linux Metasploitable2 Lab
- 35. Exploiting SMTP Port 25 Kali Linux Metasploitable2 Lab
- 36. Exploiting HTTP Port 80 Kali Linux Metasploitable2 Lab
- 37. Exploiting SMB 139 and 445 Kali Linux Metasploitable2 Lab
- 38. Exploiting BindShell Port 1524 Kali Linux Metasploitable2 Lab
- 39. Exploiting MySQL port 3306 Kali Linux Metasploitable2 Lab
- 40. Exploiting VNC port 5900 Kali Linux Metasploitable2 Lab
- 41. Exploiting Tomcat port 8180 Kali Linux Metasploitable2 Lab
- 42. Exploiting Windows 10 Kali Linux Windows Lab
- 43. Exploiting Linux Kali Linux Linux Lab
- Assessment Exercise- 06
Section 7: Maintaining Access Penetration Testing
- 44. Maintaining Access
- 45. How to create backdoor for Windows Kali Linux Windows Lab
- 46. How to hack any Android Phone Kali Linux Android Lab
- Assessment Exercise- 07
Section 8: Clearing Tracks and Report Generation - Penetration Testing
- 47. How to clear tracks
- 48. Clearing Tracks on Windows
- 49. Clearing Tracks on Linux
- 50. Report Generation
- Assessment Exercise- 08
Section 9: Final Exam
- Final Exam

