Course
From first scans to structured enumeration: learn to observe, measure exposure, and turn results into actionable hypotheses.
Lessons
23
Completed
0
Progress
0%
Lesson 01
Your First Network Scan — Understanding Before Using Nmap
Free
Lesson 02
Scanning Techniques — Visibility, Detection, and Limits
Pro
Lesson 03
Advanced Enumeration with NSE
Lesson 04
From Version to CVE — Turning a Discovery into Risk
Understanding Exploitation — Exploits, Payloads, and Shellcode
Introduction to Metasploit
First Exploits on Vulnerable Targets
Manual Exploitation Without Metasploit
Lesson 05
Basic Post-Exploitation
Lesson 06
Vulnerability Reporting and Prioritization
Analyzing a web application: reading weak signals
Analyzing a web application: headers, technologies, and entry points
Nikto — Scanning Web Vulnerabilities
Exploiting Weak Passwords with Hydra
Basic SQL Injection
XSS: Reflected and Stored Cross-Site Scripting
Hash cracking with Hashcat
Exploiting Misconfigured Services
Linux Privilege Escalation
Persistence and Trace Management
Understanding pivoting
Reproducible Pentest Methodology
Complete Pentest Simulation — From Scanning to Report
Members only
Upgrade to unlock every lesson in this module.