Description
The course provides the nescessary knowledge and steps of penetration testing such as passive/active information gathering, penetration testing, and writing the penetration test report. It covers of using security test commands and tools such as metasploit framework, wireshark, nmap, etc. to figure out the vulnerabilities hidden inside the system. It then teaches to harden and improve the security of the system.
Week | Topic |
---|---|
1 | Overview of Penetration testing and Ethical hacking |
2 | Information gathering |
3 | Network enumeration |
4 | Practical network information gathering |
5 | Application information gathering |
6 | Application vulnerability |
7 | Web application vulnerability (Part 1) |
8 | Web application vulnerability (Part 2) |
9 | Pratical web application vulnerability analysis (Part 1) |
10 | Pratical web application vulnerability analysis (Part 2) |
11 | Network vulnerability |
12 | Pratical network vulnerability analysis |
13 | System hardening and Writing the report |
14 | Penatration testing laboratory (Part 1) |
15 | Penatration testing laboratory (Part 2) |
Teaching: 2018, 2019, 2020