Penetration Testing

Within the realm of cybersecurity, penetration testing, often known as ethical hacking, is a specialised field where individuals are hired to perform security assessments on a target computer, product, web application, network, or an entire organisation. The goal of such assessments is to identify vulnerabilities, enabling their remediation or repair before malicious actors can exploit them.  The essence of what we are fighting to protect is data and privacy. Privacy is a cornerstone of our individual freedom, a force that empowers us to control the narrative of our own lives. It safeguards our personal space, thoughts, and communications from unwarranted scrutiny, allowing us to express ourselves authentically and make choices without the shadow of surveillance looming over us. 
· December 10, 2021
Course
Materials

Due to the complexity and scope of this field, the topic has been split into two courses (Penetration Testing and Advanced Penetration Testing). 

This course (Penetration Testing) is divided into three modules. The first module will start by giving a brief introduction into what penetration testing is. You will learn about the different stages of a penetration test and explore the various types of penetration tests which are conducted. The first module focuses exclusively on the first phase of a penetration test – reconnaissance. You will learn to use publicly available resources to gather information on a target, which hackers use to leverage attacks and security professionals use to strengthen their defences. You will be guided on how to setup your own Kali Linux virtual machine – an essential tool for any aspiring penetration tester. 

The second module will focus predominantly on the second phase of a penetration test – scanning and enumeration. Here you will learn about the different methods we use to scan and profile a live target, to develop a profile of what it is we are about to break into. You will be taught the essential commands needed to scan and enumerate targets using a utility known as Nmap. After this you will be guided on how to build your very own virtualised penetration testing lab, with two virtualised targets, residing on the same private virtual network, as your Kali Linux VM. You will be briefed on the concept of vulnerability scanning and then proceed to conduct a vulnerability scan on one of your virtualised targets. 

The third module will give you an introduction to the third phase of a penetration test – exploitation. Here you will learn about the art of Google Dorking and be introduced to exploitation frameworks such as Metasploit. You will learn about the concept of Bind and Reverse shells and how they relate to exploitation. You will be briefed on an online repository of vulnerabilities called Exploit-DB and learn how to navigate this using offline tools such as Searchsploit. All this knowledge will culminate in applying these skills into a successful exploitation, on a target, in your penetration testing lab. 

All the theory in this course is accompanied by hands on technical exercises so that you get a depth of learning, by doing and not just by reading. 

Course material is only available to enrolled students.

Virtual Lab System Requirements

Although it is not a requirement to complete this course, applying the theory component of the course in our virtual labs is strongly encouraged. Most modern PC’s and Apple computers (purchased within the last 5 years) should meet the system specifications required to run the lab environment.

To participate in the virtual lab environment please ensure your computer meets our minimum system specifications:

Tablets, Mobile devices, and Netbooks are not suitable.

Operating System: Windows 10 or MacOS Sierra (or above).
Processor: Minimum AMD Ryzen 5 or Intel i5 processor or newer required.
Memory: Minimum 8GB of RAM required – 16GB RAM preferable with a 64bit dual core processor.
Storage: Minimum 50GB free disk space.

Note: Your computer must be compatible with virtualization technology.

To check if your PC has virtualization capability refer to this article HERE

To check if your MAC has virtualization capability refer to this article HERE

Linux computers will not be able to support our Virtual Lab environment.

Apply M1 computers do not currently support virtualization technology and are not suitable.  

Any computers known to have overheating issues are not permitted.

If your device does not meet our local device system requirements – please purchase our browser-based challenge labs for an alternative hands on training experience.

Course Content

Expand All
Introduction To Penetration Testing
Lesson Content
0% Complete 0/1 Steps
Lesson Content
0% Complete 0/1 Steps
Lesson Content
0% Complete 0/1 Steps
ACTIVE RECONNAISSANCE
Lesson Content
0% Complete 0/1 Steps
Lesson Content
0% Complete 0/1 Steps
Lesson Content
0% Complete 0/1 Steps
Introduction To Exploitation
Lesson Content
0% Complete 0/1 Steps
Not Enrolled

Course Includes

  • 26 Lessons
  • 20 Topics
  • 12 Quizzes
  • Course Certificate
error: