Back to Course
#PentesterPrep
0% Complete
0/0 Steps
- Home Lab Setup
- Passive Information Gathering
- Active Information Gathering
- Wireshark Fundamentals
- IPv6 Overview
- Vulnerability Identification & Analysis
- Common Services, Threats & Attacks
- Exploitation
- Post-Exploitation
- The Metasploit Framework
- Privilege Escalation Techniques
- Password Attacks
- Antivirus & Firewall Evasion
- Pivoting
- Wireless Testing
- Intro to Web Exploitation
- Buffer Overflows
- Capture the Flag (CTF)