This course teaches ethical web hacking techniques using tools like Kali Linux. You'll set up labs, perform reconnaissance, scanning, exploitation, and maintain access while clearing tracks.Ideal for those entering cybersecurity and penetration testing.

Beginner to Advanced
Pass Final Exam
High Growth Potential
This course teaches ethical web hacking techniques using tools like Kali Linux. You'll set up labs, perform reconnaissance, scanning, exploitation, and maintain access while clearing tracks.Ideal for those entering cybersecurity and penetration testing.
Penetration testing basics and vulnerabilities.
Set up testing labs with Kali Linux.
Perform reconnaissance and scanning.
Use Nmap, Metasploit for exploitation.
Apply attack techniques like SQL injection.
Maintain access, clear tracks, generate reports.
Practice ethical hacking responsibly.
Analyze network and application security.
Implement defensive security measures.
Prepare for cybersecurity certifications.
Join thousands of successful students
Get expert guidance from our dedicated support team.
1. Introduction to Penetration Testing for Beginners Course
2. What is Penetration Testing
3. Why perform a Penetration Test
4. Need to know basic terms
5. Vulnerability Assessments vs Penetration Test
Assessment Exercise- 01
6. Knowledge of the target
7. Penetration testing types based on the position of tester
8. Penetration testing types based on where it is performed
Assessment Exercise- 02
9. Penetration Testing Process
10. How to Create Penetration Testing Lab Setup
11. How to Install VirtualBox Lab Setup for Penetration Testing
12. How to Install Kali Linux Lab Setup for Penetration Testing
13. How to Install Metasploitable2 Lab Setup for Penetration Testing
14. How to Install Windows Lab Setup for Penetration Testing
Assessment Exercise- 03
15. Learn basic commands Linux for Beginners
16. Introduction to Reconnaissance and Planning
17. Passive Reconnaissance
18. Whois and domain information
19. Email harvesting
20. Website source code and Website mirroring
21. Find Social Media accounts Information gathering
22. Information gathering through Job posting and Resumes
23. How to identify Web Application Firewall
Assessment Exercise- 04
24. OSINT Framework
25. What is Active Reconnaissance
26. TCP 3 Way Handshake and TCP Flags
27. Active Reconnaissance Tools
28. Active Reconnaissance LAB Scenario
29. NMAP LAB over the internet1
30. NMAP LAB on Local Network
31. NMAP LAB Vulnerability scanning using scripts
Assessment Exercise- 05
32. Exploiting FTP Port 21 Kali Linux Metasploitable2 Lab
33. Exploiting SSH 22 Kali Linux Metasploitable2 Lab
34. Exploiting Telnet 23 Kali Linux Metasploitable2 Lab
35. Exploiting SMTP Port 25 Kali Linux Metasploitable2 Lab
36. Exploiting HTTP Port 80 Kali Linux Metasploitable2 Lab
37. Exploiting SMB 139 and 445 Kali Linux Metasploitable2 Lab
38. Exploiting BindShell Port 1524 Kali Linux Metasploitable2 Lab
39. Exploiting MySQL port 3306 Kali Linux Metasploitable2 Lab
40. Exploiting VNC port 5900 Kali Linux Metasploitable2 Lab
41. Exploiting Tomcat port 8180 Kali Linux Metasploitable2 Lab
42. Exploiting Windows 10 Kali Linux Windows Lab
43. Exploiting Linux Kali Linux Linux Lab
Assessment Exercise- 06
44. Maintaining Access
45. How to create backdoor for Windows Kali Linux Windows Lab
46. How to hack any Android Phone Kali Linux Android Lab
Assessment Exercise- 07
47. How to clear tracks
48. Clearing Tracks on Windows
49. Clearing Tracks on Linux
50. Report Generation
Assessment Exercise- 08
Course Assessment
We'll help you to grow your career and growth
Honhaar Jawan
Honhaar Jawan © 2026. All Rights Reserved. Developed and Maintained by Honhaar Jawan.