Lesson 1:
How to plan your Penetration Testing
Lesson 2:
Scoping your Penetration Testing
Lesson 3:
Network & Web-Application
Lesson 4:
Scanning Vulnerability
Lesson 5:
Exploitation with Metasploit
Lesson 6:
Post-Exploitation
Lesson 7:
Pivoting Attack
Lesson 8:
Browser exploitation
Lesson 9:
In-Depth Password Attacks
Lesson 10:
Cracking / Solving CTF’s
Lesson 11:
Final Analysis