intermediate40 hours

Network Penetration Testing

Learn the methodology and tools used by professional penetration testers to assess network security. From initial reconnaissance to post-exploitation, this path covers the complete network penetration testing lifecycle. You'll learn to use industry-standard tools like Nmap, Metasploit, and various exploitation frameworks while understanding the underlying concepts that make these attacks possible.

16 lessons
4 chapters

Prerequisites

Basic networking knowledge (TCP/IP)Linux command line familiarityUnderstanding of common services

Course Content

Chapter 1

Reconnaissance & OSINT

Information gathering and open-source intelligence techniques

4 lessons
Chapter 2

Service Enumeration

Deep diving into services to find vulnerabilities

5 lessons
Chapter 3

Network Exploitation

Exploiting network services and gaining access

4 lessons
Chapter 4

Post-Exploitation

Maintaining access and extracting data

3 lessons

Ready to start?

Begin your journey with the first lesson. Your progress is saved automatically.

Start Learning