Modules
1 -
Passive Reconnaissance Techniques
#
Lesson
Type
1.
Exercise 1 - Conduct Manual OSINT Searches

2.
Exercise 2 - Review Tool-based OSINT Search Results

2 -
Active Reconnaissance Techniques
#
Lesson
Type
1.
Exercise 1 - Active Website Examination

2.
Exercise 2 - Web Server Examination

3 -
Analysis of Reconnaissance Results
#
Lesson
Type
1.
Exercise 1 - Examine Penetration Testing and Attack Frameworks

2.
Exercise 2 - Analyze Web Server Scan Results

4 -
Vulnerability Scanning (NMAP)
#
Lesson
Type
1.
Exercise 1 - NMAP Utility

5 -
Vulnerability Scanning (OpenVAS)
#
Lesson
Type
1.
Exercise 1 - Prepare OpenVAS and DVWA

2.
Exercise 2 - Explore and Configure OpenVAS

3.
Exercise 3 - Conduct Scan and Create a Report

6 -
Different Types of Network Attack Tools
#
Lesson
Type
1.
Exercise 1 - Explore a SQL Database

2.
Exercise 2 - Conduct Kerberoasting

3.
Exercise 3 - Conduct a Silver Ticket Attack in Kerberos

7 -
Application Injection Attacks
#
Lesson
Type
1.
Exercise 1 - Brute-Force Attack

2.
Exercise 2 - SQL Injection Attack

3.
Exercise 3 - Command Injection

8 -
Exploiting Application Vulnerabilities
#
Lesson
Type
1.
Exercise 1 - Session Hijacking

2.
Exercise 2 - Session Fixation

9 -
Application Tools and Attack Vectors
#
Lesson
Type
1.
Exercise 1 - Conduct a Web Application Scan

2.
Exercise 2 - Conduct Web Application Attacks

3.
Exercise 3 - Create and Deliver a Payload

10 -
On-Path Network Attacks
#
Lesson
Type
1.
Exercise 1 - ARP Spoofing

2.
Exercise 2 - SSL/TLS Downgrading

3.
Exercise 3 - File Transfer Capture

11 -
Social Engineering Attacks and Exploits
#
Lesson
Type
1.
Exercise 1 - Harvest Credentials from Phishing

2.
Exercise 2 - Gain Remote Access from USB Drop

12 -
Post-Exploitation Foothold Techniques
#
Lesson
Type
1.
Exercise 1 - Exploit PLABALMA with a Known Method

2.
Exercise 2 - Perform Privilege Escalation

3.
Exercise 3 - Establish Persistence

13 -
Post-Exploitation Exfiltration and Detection Avoidance
#
Lesson
Type
1.
Exercise 1 - Exploit Active Directory (AD)

2.
Exercise 2 - Exfiltrate a Sensitive File

3.
Exercise 3 - Detection Avoidance

14 -
Compiling a Penetration Testing Report
#
Lesson
Type
1.
Exercise 1 - Create Secure Storage

2.
Exercise 2 - Review the Testing Documents

3.
Exercise 3 - Complete the DRAFT Report

15 -
Remediation Recommendations
#
Lesson
Type
1.
Exercise 1 - Remediate Vulnerable and Outdated Components

2.
Exercise 2 - Remediate Identification and Authentication Failures

3.
Exercise 3 - Securing Logging and Monitoring Failures

16 -
Scripting Techniques
#
Lesson
Type
1.
Exercise 1 - PowerShell Ping_Sweep Script

2.
Exercise 2 - Bash Ping_Sweep Script

3.
Exercise 3 - Bash Os-Config_Checker Script

17 -
Analyze Automation Script
#
Lesson
Type
1.
Exercise 1 - Test the Script

2.
Exercise 2 - Analyze the Script

3.
Exercise 3 - Modify and Test the Script
