Learn how to ethically identify, exploit, and report vulnerabilities in systems and networks. This course covers all phases of penetration testing:
Discover how to gather open-source intelligence (OSINT), scan for public information, and profile targets.
Evaluate your knowledge of reconnaissance methods and vulnerability scanning tools.
Collection of recommended tools for each phase of a pen-test
Checklist for common steps and best practices during penetration tests
Documentation on rules of engagement and ethical hacking principles
Upload a sample penetration testing report or vulnerability findings.
Demonstrate your ability to plan, execute, and report on a penetration test. You must score 85% or higher to pass.
Please log in to view this outline.
Please log in to enroll in this course.