/practical-ethical-hacking-course

Comprehensive notes from a hands-on course covering networking, Linux, Python, Metasploit, Burp Suite, Active Directory, and web application penetration testing.

Primary LanguagePython

Practical Ethical Hacking

Comprehensive notes from a hands-on course covering networking, Linux, Python, Metasploit, Burp Suite, Active Directory, and web application penetration testing.

Course Curriculum

# Unit
001 Introduction
002 A day in the life of a pentester
003 Effective notekeeping
004 Networking Refresher
005 Setting Up Our Lab
006 Introduction to Linux
007 Introduction to Python
008 The Ethical Hacker Methodology
009 Information Gathering (Reconnaissance)
010 Scanning & Enumeration
011 Vulnerability Scanning with Nessus
012 Exploitation Basics
013 Exploit Development
014 Capstone
015 Active Directory Overview
016 Active Directory Lab Build
017 Attacking Active Directory - Initial Attack Vectors
018 Attacking Active Directory - Post-Compromise Enumeration
019 Attacking Active Directory - Post-Compromise Attacks
020 We've Compromised the Domain - Now What?
021 Additional Active Directory Attacks
022 Active Directory Case Studies
023 Post Exploitation
024 Web Application Enumeration - Revisited
025 Find & Exploit Common Web Vulnerabilities
026 Wireless Penetration Testing
027 Legal Documents and Report Writing
028 Career Advice

Based on Practical Ethical Hacking: The Complete Course by TCM Security (2023).