We would begin by learning the terminologies when learning penetration testing and ethical hacking, get introduced to penetration testing and the methodologies used in Penetration Testing, set up a penetration testing lab in Windows and Linux, move to passive information gathering and active information gathering, how to use tools such as Nessus, OpenVAS to perform various levels of vulnerability scanning on web applications or actual hosts.
We shall also discuss Network Penetration Testing and Network based attacks, actual exploitations and create custom exploits, Antivirus evation, and password hacking with john the ripper, hashcat etc.
We will conclude the course with an introduction to web application penetration testing, explaining the fundamentals of how the web works, OWASP Top 10 and how various vulnerabilities can be exploited.