Saltar al contenido principal

Penetration Testing

75 hours 10 Modules 20+ Labs Intermediate

Course Description

Learn the PTES (Penetration Testing Execution Standard) methodology used by professional security consultants. This course covers the complete pentest lifecycle from scoping to reporting.


Learning Objectives

By the end of this course, you will be able to:

  1. Scope penetration testing engagements professionally
  2. Perform comprehensive reconnaissance and enumeration
  3. Identify and exploit vulnerabilities systematically
  4. Document findings according to industry standards
  5. Write professional penetration test reports
  6. Communicate risks effectively to stakeholders

Course Structure


Modules

Module 1: Pre-engagement Interactions (6h)

  • Scoping meetings and questionnaires
  • Rules of engagement (ROE)
  • Statement of work (SOW)
  • Legal considerations
  • NDA and contracts
  • Emergency contacts and escalation

Module 2: Intelligence Gathering (10h)

  • Passive reconnaissance techniques
  • Active reconnaissance methods
  • OSINT tools and techniques
  • Network mapping
  • Service enumeration
  • Vulnerability research

Module 3: Threat Modeling (6h)

  • Asset identification
  • Threat actor analysis
  • Attack surface mapping
  • Risk prioritization
  • STRIDE methodology
  • Attack trees

Module 4: Vulnerability Analysis (10h)

  • Automated scanning (Nessus, OpenVAS)
  • Manual vulnerability assessment
  • False positive validation
  • Vulnerability prioritization
  • CVE research
  • Exploit database usage

Module 5: Exploitation (12h)

  • Metasploit Framework mastery
  • Manual exploitation techniques
  • Client-side attacks
  • Web application exploitation
  • Network exploitation
  • Wireless attacks

Module 6: Post-Exploitation (10h)

  • Privilege escalation
  • Lateral movement
  • Data exfiltration
  • Persistence mechanisms
  • Pivoting techniques
  • Credential harvesting

Module 7: Network Penetration Testing (8h)

  • External network testing
  • Internal network testing
  • Wireless penetration testing
  • VPN testing
  • Firewall bypass techniques

Module 8: Web Application Testing (8h)

  • OWASP Testing Guide
  • Authentication testing
  • Session management testing
  • Input validation testing
  • Business logic testing

Module 9: Report Writing (8h)

  • Executive summary writing
  • Technical findings documentation
  • Risk rating methodologies (CVSS)
  • Remediation recommendations
  • Evidence collection
  • Report templates

Module 10: Professional Skills (5h)

  • Client communication
  • Presentation skills
  • Time management
  • Ethics and professionalism
  • Certification paths (OSCP, PNPT, CEH)

Tools

ToolPurpose
NmapNetwork scanning
MetasploitExploitation framework
Burp SuiteWeb testing
NessusVulnerability scanning
Cobalt StrikeRed team operations
CherryTreeNote taking
DradisReporting platform

Ethical Use Only

Always obtain proper written authorization before conducting any penetration test. Document everything.


Quick Navigation