Module 1: Engagement Planning
1.1 Assessment Types and Goals
1.2 The Penetration Testing Process
1.3 Documentation and Planning
1.4 Engagement Scope
1.5 Scripting
Lab: Scripting Techniques
Lab: Analyze Automation Script
Quiz 1
Module 2: Reconnaissance
2.1 Reconnaissance Techniques
Lab: Passive Reconnaissance Techniques
2.2 OSINT Gathering
Quiz 2
Module 3: Active Reconnaissance
3.1 Network Scanning
Lab: Active Reconnaissance Techniques
3.2 Vulnerability Scanning
Lab: Vulnerability Scanning (NMAP)
Lab: Vulnerability Scanning (OpenVAS)
3.3 Application Testing
Quiz 3
Module 4: Leveraging Target Information
4.1 Vulnerability Analysis
Lab: Analysis of Reconnaissance Results
4.2 Exploitation Techniques
Quiz 4
Midterm Exam
Module 5: Exploiting Organizational Vulnerabilities
5.1 Social Engineering
Lab: Social Engineering Attacks and Exploits
5.2 Physical Security Attacks
5.3 Cloud Technology Attacks
Quiz 5
Module 6: Exploiting Network Vulnerabilities
6.1 Network Attacks
Lab: Different Types of Network Attack Tools
6.2 Wireless Attacks
Lab: On-Path Network Attacks
Quiz 6
Module 7: Exploiting Applications
7.1 Attacking Insecure Code
7.2 Attacking Web Applications
Lab: Exploiting Application Vulnerabilities
Lab: Application Tools and Attack Vectors
Lab: Application Injection attacks
Quiz 7
Module 8: Host Exploitation
8.1 Finding Host Vulnerabilities
8.2 Operating System Exploits
8.3 Post-Exploitation Techniques
Lab: Post-Exploitation Exfiltration and Detection Avoidance
Lab: Post-Exploitation Foothold Techniques
Quiz 8
Module 9: Engagement Follow-up
9.1 Report Preparation
Lab: Compiling a Penetration Testing Report
9.2 Remediation and Follow-up
Lab: Remediation Recommendations
Quiz 9
Final Exam