Call Us+92 42 38977164
Email Ussupport@eskills.pk
Contact Us
Logo
  • Home
  • Courses
  • Referral Program
  • Apply For Certificate
  • Admission Process
  • Contact Support
LoginRegister
Logo
  • Home
  • Courses
  • Referral Program
  • Apply For Certificate
  • Admissions Process
  • Contact Support
LoginApply Now
Penetration Testing Basics

Penetration Testing Basics

About Course

This course will teach you how to perform penetration testing on websites and web applications, identify vulnerabilities, exploit them, and secure web servers. You will get hands-on experience with tools like Kali Linux, Metasploit, Nmap, and others for conducting penetration testing.


Learn penetration testing techniques and exploit vulnerabilities in web applications and websites.


Requirements

  • ✓Basic knowledge of networking and web technologies.
  • ✓Basic understanding of operating systems, especially Linux.
  • ✓A computer with internet access.
  • ✓Willingness to learn penetration testing techniques and ethical hacking.

Course Curriculum


Section 1: Introduction

  • 1. Introduction to Penetration Testing for Beginners Course

  • 2. What is Penetration Testing

  • 3. Why perform a Penetration Test

  • 4. Need to know basic terms

  • 5. Vulnerability Assessments vs Penetration Test

  • Assessment Exercise- 01

Section 2: Types of Penetration Testing

  • 6. Knowledge of the target

  • 7. Penetration testing types based on the position of tester

  • 8. Penetration testing types based on where it is performed

  • Assessment Exercise- 02

Section 3: How to create Penetration Testing Lab Setup Lab Environment and Basic commands

  • 9. Penetration Testing Process

  • 10. How to Create Penetration Testing Lab Setup

  • 11. How to Install VirtualBox Lab Setup for Penetration Testing

  • 12. How to Install Kali Linux Lab Setup for Penetration Testing

  • 13. How to Install Metasploitable2 Lab Setup for Penetration Testing

  • 14. How to Install Windows Lab Setup for Penetration Testing

  • Assessment Exercise- 03

Section 4: Reconnaissance and Planning - Penetration Testing

  • 15. Learn basic commands Linux for Beginners

  • 16. Introduction to Reconnaissance and Planning

  • 17. Passive Reconnaissance

  • 18. Whois and domain information

  • 19. Email harvesting

  • 20. Website source code and Website mirroring

  • 21. Find Social Media accounts Information gathering

  • 22. Information gathering through Job posting and Resumes

  • 23. How to identify Web Application Firewall

  • Assessment Exercise- 04

Section 5: Scanning and Discovery - Penetration Testing

  • 24. OSINT Framework

  • 25. What is Active Reconnaissance

  • 26. TCP 3 Way Handshake and TCP Flags

  • 27. Active Reconnaissance Tools

  • 28. Active Reconnaissance LAB Scenario

  • 29. NMAP LAB over the internet1

  • 30. NMAP LAB on Local Network

  • 31. NMAP LAB Vulnerability scanning using scripts

  • Assessment Exercise- 05

Section 6: Exploitation - Penetration Testing

  • 32. Exploiting FTP Port 21 Kali Linux Metasploitable2 Lab

  • 33. Exploiting SSH 22 Kali Linux Metasploitable2 Lab

  • 34. Exploiting Telnet 23 Kali Linux Metasploitable2 Lab

  • 35. Exploiting SMTP Port 25 Kali Linux Metasploitable2 Lab

  • 36. Exploiting HTTP Port 80 Kali Linux Metasploitable2 Lab

  • 37. Exploiting SMB 139 and 445 Kali Linux Metasploitable2 Lab

  • 38. Exploiting BindShell Port 1524 Kali Linux Metasploitable2 Lab

  • 39. Exploiting MySQL port 3306 Kali Linux Metasploitable2 Lab

  • 40. Exploiting VNC port 5900 Kali Linux Metasploitable2 Lab

  • 41. Exploiting Tomcat port 8180 Kali Linux Metasploitable2 Lab

  • 42. Exploiting Windows 10 Kali Linux Windows Lab

  • 43. Exploiting Linux Kali Linux Linux Lab

  • Assessment Exercise- 06

Section 7: Maintaining Access Penetration Testing

  • 44. Maintaining Access

  • 45. How to create backdoor for Windows Kali Linux Windows Lab

  • 46. How to hack any Android Phone Kali Linux Android Lab

  • Assessment Exercise- 07

Section 8: Clearing Tracks and Report Generation - Penetration Testing

  • 47. How to clear tracks

  • 48. Clearing Tracks on Windows

  • 49. Clearing Tracks on Linux

  • 50. Report Generation

  • Assessment Exercise- 08

Section 9: Final Exam

  • Final Exam

Penetration Testing Basics

★ 4.8(75 reviews)
(150)
Enrolled
Intermediate
Level
Urdu / Urdu
Language

What You Will Learn

  • ✓Learn penetration testing basics and how to identify vulnerabilities.
  • ✓Set up a penetration testing lab using Kali Linux and Metasploit.
  • ✓Perform reconnaissance and scanning to gather information on targets.
  • ✓Use tools like Nmap and Metasploit for vulnerability scanning and exploitation.
  • ✓Understand and apply various attack techniques like SQL injection, XSS, and others.
  • ✓Learn how to maintain access, clear tracks, and generate reports for penetration testing.
  • ✓Master ethical hacking practices to ensure responsible testing and security improvement.
NVTTI Logo

Connect With Us

+92 42 38977164
support@eskills.pk

Links

  • •Home
  • •Courses
  • •Referral Program
  • •Apply For Certificate

Top Courses

  • •

    Motion Graphics with After Effects

  • •

    Video Editing Basics

  • •

    Canva Graphic Design

  • •

    Graphic Design Masterclass

  • •

    Blender 3D Design & Animation

Support

  • •Contact Support
  • •Admission Process
© All copyright reserved by Eskills Training Program