Learn the essential skills for ethical hacking and penetration testing in this hands-on crash course. Ethical hacking involves using the same techniques as malicious hackers, but in a legal and legitimate way to evaluate the security vulnerabilities in computer systems and web applications.
This course receives regular updates – please check our blog for new releases.
Expected Completion Time: 2-3 hours
Difficulty: Easy
NOTE: This course is not fully optimized for mobile and may have issues when navigating. We recommend taking this course on your desktop or laptop for the best experience.
Introduction
An Introduction into the World of Ethical Hacking and Penetration Testing. We will discuss differences between ethical hacking, penetration testing and red teaming. We will briefly touch upon the important the legalities and ethics of hacking and penetration testing.
Lessons
Prerequisites What is ethical hacking? Penetration testing methodologies How to use this courseMetasploitable 2 – Lab and Tools Setup
This module will guide you through the installation and configuration of essential tools and software, including virtual machines, and key penetration testing tools such as Kali Linux.
Lessons
VirtualBox Install NatNetwork Setup Metasploitable 2 Setup Kali Linux VM SetupMetasploitable 2 – Enumeration Methods
In this module, you will explore the critical phase of enumeration in the ethical hacking process. Enumeration involves systematically extracting detailed information about a network, system, or application to identify potential entry points for exploitation.
Lessons
Enumeration Tools Setup nmap rustscan nuclei gobusterMetasploitable 2 – Initial Foothold
This module focuses on gaining the initial foothold in a target system, a crucial step in the penetration testing lifecycle. You will learn techniques and strategies for exploiting identified vulnerabilities to gain unauthorized access.
Lessons
Exploit-DB and searchsploit Metasploit Python shell upgradeMetasploitable 2 – Privilege Escalation
This module explores techniques and methodologies used to escalate privileges within a compromised system. You will explore privilege escalation methods, learning how attackers elevate their access rights to gain control over critical system resources.
Lessons
File transfer – Python Server Local enumeration with linPEAS GTFOBins – shell breakoutConclusion
We will recap the key concepts and techniques covered, emphasizing the practical skills you have acquired in this crash course.
Lessons
SummaryNext Steps
In this module, you will explore the various paths to advance your career in ethical hacking and cybersecurity. We will explore career paths, certifications and application to private programs.
