Penetration Testing and Ethical Hacking
Penetration Testing and Ethical Hacking
This penetration testing course introduces legal aspects, Kali Linux tools, reconnaissance, vulnerability mapping, exploitation with Metasploit and defense evasion, ending with a practical network security project.
Earn a certificate with an Academy Pro+ subscription

Stand out to recruiters

Share on professional channels

Globally recognised

Land your dream job

Course outline
Industry focussed curriculum designed by experts
Introduction to Penetration Testing
5 items
0.27 hr
- Learning Objectives
- Introduction to Penetration Testing
- Rules of Engagement
- Methodologies & Standards
- Threat Modeling
Planning and Preparation for Pen-Testing
8 items
1.39 hr
- Life Cycle and Planning for a Pen Test
- Gathering Requirements
- Introduction to Kali Linux
- Kali Linux Installation Demo
- Kali Linux Tool Suite
- Recon-ng Tool in Kali Linux
- Basic Kali Linux Terminal Commands
- Essential Kali Linux Terminal Commands
Reconnaissance
4 items
0.36 hr
- Introduction to Active and Passive Reconnaissance
- Passive Reconnaissance
- Scanning and Network Reconnaissance
- Scanning and Network Reconnaissance Demo
Vulnerability Assessment
2 items
0.31 hr
- Vulnerability Scanning and Enumeration
- Vulnerability Mapping
Exploitation
4 items
0.40 hr
- Introduction to Metasploit
- Metasploit - Demo
- Exploiting Eternal Blue Vulnerability
- Demo Metasploitable EternalBlue
Get access to the complete curriculum with your free trial
Start 7-Day Free TrialGuided Projects
Solve real-world projects with a step-by-step guide, starter code templates, and access to model solutions to boost your skills and build a standout resume.
- GUIDED PROJECT 1
- Vulnerability Assessment and Penetration Testing of a Local Network
- This project aims to provide students with hands-on experience in conducting a comprehensive vulnerability assessment and penetration testing on a local network environment. Students will utilize Kali Linux and various penetration testing tools to identify, exploit and report vulnerabilities in network systems, thereby enhancing their understanding of security measures and best practices.
- GUIDED PROJECT 2
- Exploitation Project Using Metasploit
- In this project, students will utilize the Metasploit framework to exploit a known vulnerability (such as the EternalBlue vulnerability) in a controlled environment. The project will guide them through the phases of setting up vulnerable systems, choosing appropriate exploits and conducting penetration testing to gain unauthorized access, culminating in a comprehensive report of the process and findings.
Gain skills & build your resume with complete access to guided projects in your free trial
Start 7-Day Free TrialCourse Instructors
Abdul Mateen
Information Security Analyst
Gain work-ready skills with an Academy Pro+ subscription
Get unlimited access to in-demand courses that get you noticed at work
Subscribe To Pro+ • $25/MonthShare your certificate online
Share your professional certificate & updated resume on LinkedIn


Learn from the best
Taught by top faculty & industry experts


Learn by doing
Apply skills with guided projects and interactive coding exercises
AI Mock Interviews
30+ Guided Projects
500+ Coding Exercises

Learn with AI
Get AI-powered coding hints & instant doubt resolution
24x7 Doubt resolution
Coding Hints
Advance your career with
Top University programs
Gain industry-relevant skills through learning from top faculty, guidance from industry mentors, and hands-on projects.






MIT Professional Education
12 Weeks  • Online









McCombs School of Business at The University of Texas at Austin
7 months  • Online



McCombs School of Business at The University of Texas at Austin
7 months  • Online



McCombs School of Business at The University of Texas at Austin
6 months  • Online


