0% found this document useful (0 votes)
175 views37 pages

Penetration Testing Training

The document outlines the modules of a penetration testing training program. It includes 16 modules that cover topics such as introduction to hacking, information gathering, scanning and vulnerability assessment, Windows and Linux hacking, wireless hacking, network attacking, database injection, and web exploitation. Each module has multiple sections and lessons that delve deeper into the associated technical skills and techniques needed for penetration testing. The program aims to provide solid foundational knowledge and skills for penetration testing through these comprehensive modules and lessons.

Uploaded by

SaintMalik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
175 views37 pages

Penetration Testing Training

The document outlines the modules of a penetration testing training program. It includes 16 modules that cover topics such as introduction to hacking, information gathering, scanning and vulnerability assessment, Windows and Linux hacking, wireless hacking, network attacking, database injection, and web exploitation. Each module has multiple sections and lessons that delve deeper into the associated technical skills and techniques needed for penetration testing. The program aims to provide solid foundational knowledge and skills for penetration testing through these comprehensive modules and lessons.

Uploaded by

SaintMalik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

Hackers Era Training

Module :

Penetration Testing Training


Module 1 : Introduction to the World of
Hacking: SOL 1








Module 2 : Introduction to the World of
Hacking: SOL 1







Module 3 : Solid Introduction to pentest:
SOL 2









Module 3 : Solid Introduction to pentest:
SOL3









Module 3 : Solid Introduction to pentest:
SOL3









Module 3 : Solid Introduction to pentest:
SOL3


Module 4 : Google As A Weapon : SOL 4








Module 4 : Google As A Weapon : SOL 4







Module 5 : Intelligent Information Gathering
SOL 5









Module 5 : Intelligent Information Gathering
SOL 6







Module 5 : Intelligent Information Gathering
SOL 6





Module 6 : Scanning and Vulnerability
Assessment SOL 7










Module 6 : Scanning and Vulnerability
Assessment SOL 7






Module 7 : Advanced Windows Hacking &
Protection SOL 8








Module 7 : Advanced Windows Hacking &
Protection SOL 9










Module 7 : Advanced Windows Hacking &
Protection SOL 10







Module 8 : Hacking Linux SOL 11








Module 8 : Hacking Linux
SOL11









Module 10 : Metasploit SOL 14









Module 10 : Metasploit SOL 15







Module 11 : Windows & Unix Post
Exploitation SOL 16








Module 11 : Windows & Unix Post
Exploitation SOL 17









Module 12 : Wireless Hacking (Not Ever
Happen Before) SOL 18








Module 12 : Wireless Hacking (Not Ever
Happen Before) SOL 18










Module 12 : Wireless Hacking (Not Ever
Happen Before) SOL 18


○ Airmon-ng
○ Airodump-ng
○ Aireplay-ng
○ Injection Test



Module 12 : Wireless Hacking (Not Ever
Happen Before) SOL 19








Module 12 : Wireless Hacking (Not Ever
Happen Before) SOL 20







Module 13 : Network Attacking SOL 21








Module 13 : Network Attacking SOL 22








Module 13 : Network Attacking SOL 22





Module 15 : Injecting The Database SOL 25








Module 15 : Injecting The Database SOL 26







Module 16 : Web Exploitation SOL 27-28








Module 16 : Web Exploitation SOL 29-30






Module 18 : Extra Module ( Tips & Tricks ) SOL 31

You might also like