PENETRATION TESTING

Current Status
Not Enrolled
Price
Closed
Get Started
This course is currently closed

Course Content

Read Me
Section 1: Introduction to Pentesting
Section 2: Creating Lab
Section 3: Introduction to Kali Linux
Section 4: Some useful tools
Section 5: Information Gathering
Section 6: Scanning
Section 7: Enumeration
Section 8: Web App Exploits
Section 9: File Transfer
Section 10: Metasploit Basics
Section 11: Exploitation
Section 12: Password Attack
Section 13: Privilege Escalation
Section 14: Buffer Overflow
Capstone
Form for Internship/Project letter
This entry was posted in . Bookmark the permalink.
× How can I help you?