Penetration Testing Web Hacking

This course teaches ethical web hacking techniques using tools like Kali Linux. You'll set up labs, perform reconnaissance, scanning, exploitation, and maintain access while clearing tracks.Ideal for those entering cybersecurity and penetration testing.

Only Pakistan Residents
Penetration Testing Web Hacking

Course Level

Beginner to Advanced

Certification

Pass Final Exam

Career Impact

High Growth Potential

Course Overview

This course teaches ethical web hacking techniques using tools like Kali Linux. You'll set up labs, perform reconnaissance, scanning, exploitation, and maintain access while clearing tracks.Ideal for those entering cybersecurity and penetration testing.

What You'll Learn

Penetration testing basics and vulnerabilities.

Set up testing labs with Kali Linux.

Perform reconnaissance and scanning.

Use Nmap, Metasploit for exploitation.

Apply attack techniques like SQL injection.

Maintain access, clear tracks, generate reports.

Practice ethical hacking responsibly.

Analyze network and application security.

Implement defensive security measures.

Prepare for cybersecurity certifications.

Ready to Start Learning?

Join thousands of successful students

Duration
3 Month
Eligibility
Only Pakistan Residents
Certificate
Pass Final Exam

Expert Support

Get expert guidance from our dedicated support team.

Detailed Curriculum

Section 1: Introduction

1. Introduction to Penetration Testing for Beginners Course

2. What is Penetration Testing

3. Why perform a Penetration Test

4. Need to know basic terms

5. Vulnerability Assessments vs Penetration Test

Assessment Exercise- 01

Section 2: Types of Penetration Testing

6. Knowledge of the target

7. Penetration testing types based on the position of tester

8. Penetration testing types based on where it is performed

Assessment Exercise- 02

Section 3: How to create Penetration Testing Lab Setup Lab Environment and Basic commands

9. Penetration Testing Process

10. How to Create Penetration Testing Lab Setup

11. How to Install VirtualBox Lab Setup for Penetration Testing

12. How to Install Kali Linux Lab Setup for Penetration Testing

13. How to Install Metasploitable2 Lab Setup for Penetration Testing

14. How to Install Windows Lab Setup for Penetration Testing

Assessment Exercise- 03

Section 4: Reconnaissance and Planning - Penetration Testing

15. Learn basic commands Linux for Beginners

16. Introduction to Reconnaissance and Planning

17. Passive Reconnaissance

18. Whois and domain information

19. Email harvesting

20. Website source code and Website mirroring

21. Find Social Media accounts Information gathering

22. Information gathering through Job posting and Resumes

23. How to identify Web Application Firewall

Assessment Exercise- 04

Section 5: Scanning and Discovery - Penetration Testing

24. OSINT Framework

25. What is Active Reconnaissance

26. TCP 3 Way Handshake and TCP Flags

27. Active Reconnaissance Tools

28. Active Reconnaissance LAB Scenario

29. NMAP LAB over the internet1

30. NMAP LAB on Local Network

31. NMAP LAB Vulnerability scanning using scripts

Assessment Exercise- 05

Section 6: Exploitation - Penetration Testing

32. Exploiting FTP Port 21 Kali Linux Metasploitable2 Lab

33. Exploiting SSH 22 Kali Linux Metasploitable2 Lab

34. Exploiting Telnet 23 Kali Linux Metasploitable2 Lab

35. Exploiting SMTP Port 25 Kali Linux Metasploitable2 Lab

36. Exploiting HTTP Port 80 Kali Linux Metasploitable2 Lab

37. Exploiting SMB 139 and 445 Kali Linux Metasploitable2 Lab

38. Exploiting BindShell Port 1524 Kali Linux Metasploitable2 Lab

39. Exploiting MySQL port 3306 Kali Linux Metasploitable2 Lab

40. Exploiting VNC port 5900 Kali Linux Metasploitable2 Lab

41. Exploiting Tomcat port 8180 Kali Linux Metasploitable2 Lab

42. Exploiting Windows 10 Kali Linux Windows Lab

43. Exploiting Linux Kali Linux Linux Lab

Assessment Exercise- 06

Section 7: Maintaining Access Penetration Testing

44. Maintaining Access

45. How to create backdoor for Windows Kali Linux Windows Lab

46. How to hack any Android Phone Kali Linux Android Lab

Assessment Exercise- 07

Section 8: Clearing Tracks and Report Generation - Penetration Testing

47. How to clear tracks

48. Clearing Tracks on Windows

49. Clearing Tracks on Linux

50. Report Generation

Assessment Exercise- 08

Section 9. Course Assessment

Course Assessment

Do you have questions?

We'll help you to grow your career and growth

Honhaar Jawan

Honhaar Jawan © 2026. All Rights Reserved. Developed and Maintained by Honhaar Jawan.