• Lesson 1: How to plan your Penetration Testing
  • Lesson 2: Scoping your Penetration Testing
  • Lesson 3: Network & Web-Application
  • Lesson 4: Scanning Vulnerability
  • Lesson 5: Exploitation with Metasploit
  • Lesson 6: Post-Exploitation
  • Lesson 7: Pivoting Attack
  • Lesson 8: Browser exploitation
  • Lesson 9: In-Depth Password Attacks
  • Lesson 10: Cracking / Solving CTF’s
  • Lesson 11: Final Analysis