Penetration Testing
Here is the Demo Video of this Course
Course Curriculum
Course Content
Read Me
Section 1: Introduction to Pentesting
Section 2: Creating Lab
Section 3: Introduction to Kali Linux
Section 4: Some useful tools
Section 5: Information Gathering
Section 6: Scanning
Section 7: Enumeration
Section 8: Web App Exploits
Section 9: File Transfer
Section 10: Metasploit Basics
Section 11: Exploitation
Section 12: Password Attack
Section 13: Privilege Escalation
Section 14: Buffer Overflow
Capstone
Form for Internship/Project letter