Offensive Security Track

Ethical Hacking & Penetration Testing

Master the mindset of an attacker to build unshakeable defenses. Learn to identify, exploit, and document vulnerabilities using industry-standard tools and methodologies.

14 Weeks
Advanced
4 Credits

About This Course

Ethical hacking involves authorized attempts to gain unauthorized access to a computer system, application, or data. By mimicking the techniques of malicious actors, you can discover security holes before they are exploited.

This course is a deep dive into offensive security. You will learn to navigate the Kali Linux environment, use the Metasploit framework, and conduct full-scale penetration tests that provide organizations with actionable security intelligence.

Skills You Will Gain

Kali Linux Mastery Metasploit Framework Vulnerability Assessment Web App Pen-Testing Network Exploitation Ethical Reporting

Course Syllabus

Module 1: The 5 Phases of Ethical Hacking

Understand the structured approach to hacking. Learn about Reconnaissance, Scanning, Gaining Access, Maintaining Access, and Clearing Tracks.

Module 2: Reconnaissance & Footprinting

Learn the critical first step: gathering information. Master Passive Recon (OSINT, Google Dorking) and Active Recon (Port scanning with Nmap).

Module 3: Vulnerability Analysis & Exploitation

Identify the weak points. Use scanners like Nessus to find vulnerabilities and Metasploit to launch exploits and gain remote shells.

Module 4: Web Application Hacking

Attack the web layer. Learn to identify and exploit SQL Injection, Cross-Site Scripting (XSS), and Broken Authentication.

Module 5: Post-Exploitation & Reporting

Learn how to maintain access (Persistence), pivot through a network, and write professional reports that help fix identified issues.