Penetration Testing Course
Penetration Testing
Introduction
Advanced Network Scanning Techniques
Exploitation Strategies and Tactics
Advanced Command Usage in Kali Linux
Bash Scripting for Penetration Testing
Practical Tools and Hands-on Labs
Active and Passive Information Gathering Techniques
Understanding and Exploiting Buffer Overflows
Fixing Exploits and Locating Public Exploits
Antivirus Evasion
File Transfers and Data Exfiltration Techniques
Privilege Escalation on Windows Systems
Privilege Escalation on Linux Systems
Password Attacks and Cracking Techniques
Port Redirection and Tunneling Techniques
Attacking Active Directory Environments
PowerShell Empire for Post-Exploitation
Challenges and Advanced Labs
Penetration Test Analysis and Reporting