Professional Documents
Culture Documents
Penetration Testing Training
Penetration Testing Training
Module :
➢
➢
➢
➢
➢
➢
➢
Module 2 : Introduction to the World of
Hacking: SOL 1
➢
➢
➢
➢
➢
➢
Module 3 : Solid Introduction to pentest:
SOL 2
➢
➢
➢
➢
➢
➢
➢
➢
Module 3 : Solid Introduction to pentest:
SOL3
➢
○
○
○
○
○
○
➢
Module 3 : Solid Introduction to pentest:
SOL3
➢
○
○
○
○
➢
➢
➢
➢
Module 3 : Solid Introduction to pentest:
SOL3
➢
➢
Module 4 : Google As A Weapon : SOL 4
➢
➢
➢
➢
➢
➢
➢
Module 4 : Google As A Weapon : SOL 4
➢
○
○
➢
➢
➢
Module 5 : Intelligent Information Gathering
SOL 5
➢
➢
➢
➢
➢
➢
➢
➢
Module 5 : Intelligent Information Gathering
SOL 6
➢
➢
➢
➢
➢
➢
➢
Module 5 : Intelligent Information Gathering
SOL 6
➢
➢
➢
➢
➢
Module 6 : Scanning and Vulnerability
Assessment SOL 7
➢
○
○
○
○
➢
○
○
○
○
Module 6 : Scanning and Vulnerability
Assessment SOL 7
➢
➢
➢
○
➢
Module 7 : Advanced Windows Hacking &
Protection SOL 8
➢
○
○
○
○
➢
➢
Module 7 : Advanced Windows Hacking &
Protection SOL 9
➢
➢
➢
➢
➢
➢
➢
➢
➢
Module 7 : Advanced Windows Hacking &
Protection SOL 10
➢
➢
➢
➢
➢
➢
Module 8 : Hacking Linux SOL 11
➢
➢
➢
➢
➢
➢
➢
Module 8 : Hacking Linux
SOL11
➢
➢
➢
➢
➢
➢
➢
➢
Module 10 : Metasploit SOL 14
➢
➢
➢
➢
➢
➢
➢
➢
Module 10 : Metasploit SOL 15
➢
➢
➢
➢
➢
➢
Module 11 : Windows & Unix Post
Exploitation SOL 16
➢
➢
➢
➢
➢
➢
➢
Module 11 : Windows & Unix Post
Exploitation SOL 17
➢
➢
➢
➢
➢
➢
➢
➢
Module 12 : Wireless Hacking (Not Ever
Happen Before) SOL 18
➢
○
○
○
○
➢
➢
Module 12 : Wireless Hacking (Not Ever
Happen Before) SOL 18
➢
○
○
○
○
○
○
➢
➢
Module 12 : Wireless Hacking (Not Ever
Happen Before) SOL 18
➢
○ Airmon-ng
○ Airodump-ng
○ Aireplay-ng
○ Injection Test
➢
➢
➢
Module 12 : Wireless Hacking (Not Ever
Happen Before) SOL 19
➢
➢
➢
➢
➢
➢
➢
Module 12 : Wireless Hacking (Not Ever
Happen Before) SOL 20
➢
➢
➢
➢
➢
➢
Module 13 : Network Attacking SOL 21
➢
➢
➢
➢
➢
➢
➢
Module 13 : Network Attacking SOL 22
➢
➢
➢
➢
➢
➢
➢
Module 13 : Network Attacking SOL 22
➢
➢
➢
➢
Module 15 : Injecting The Database SOL 25
➢
➢
➢
➢
➢
➢
➢
Module 15 : Injecting The Database SOL 26
➢
➢
➢
➢
➢
➢
Module 16 : Web Exploitation SOL 27-28
➢
➢
➢
➢
➢
➢
➢
Module 16 : Web Exploitation SOL 29-30
➢
➢
➢
➢
➢
Module 18 : Extra Module ( Tips & Tricks ) SOL 31