HackPathHackPath
CoursesRoadmapPracticePricing
HackPath

From zero to Hacker. No shortcuts.

Product

  • Courses
  • Roadmap
  • Pricing
  • Contact

Legal

  • Privacy Policy
  • Terms of Service

© 2026 HackPath. All rights reserved.

Instagram

All courses

Explore every course available. Pick a track and start learning.

Quick Wins

Real-world situations

Short focused courses built around concrete scenarios. 3 lessons, one skill, zero fluff.

Quick Win
1 FREE LESSON
Network Privacy — Real-World Investigations
Practical network analysis for real situations: detect hidden cameras, identify unknown devices, and audit any network you're connected to.
3modules
1h 30m
Start free lesson
Quick Win
1 FREE LESSON
Is My Phone Being Tracked?
Find out who is watching you through your own phone. Audit location permissions, detect hidden tracking apps, and lock down your device against surveillance.
3modules
1h 35m
Start free lesson
Quick Win
1 FREE LESSON
What Does Your Boss See on the Work Wi-Fi?
3modules
1h 30m
Start free lesson
Quick Win
1 FREE LESSON
Spot a Phishing Site in 60 Seconds
3modules
1h 35m
Start free lesson
Quick Win
1 FREE LESSON
Has My Password Been Leaked?
3modules
1h 30m
Start free lesson

Track

Foundations

Build core fundamentals before moving to specialized tracks.

beginner
FREE
Learning Process
Mindset, method, and structure for learning security skills fast.
19modules
6h 47m
Start course
beginner
FREE
Foundations of Information Security
Core concepts, domains, threats, and roles across the InfoSec landscape.
19modules
4h 5m
Start course

Track

Terminal & Linux Core

Command line mastery, Linux internals, permissions, and tooling.

beginner
1 FREE LESSON
Terminal Mastery
Master the command line from first principles: learn what a shell is, how commands execute, and how to work efficiently and safely.
54modules
15h 39m
Start free lesson
beginner
Coming soon
Operating Systems
Explore process, memory, and filesystem internals.
1modules
10m
Coming soon

Track

Networking & Traffic Analysis

Protocols, DNS, packet captures, and traffic inspection.

intermediate
Coming soon
Networking Deep Dive
TCP/IP, DNS, HTTP, sockets. Understand how data actually moves across the wire.
3modules
42m
Coming soon
intermediate
1 FREE LESSON
Find Anyone with OSINT
A beginner-friendly OSINT course that teaches real investigation methodology and digital footprint awareness. Learn how public clues connect, then learn how to reduce your own exposure.
12modules
9h 40m
Start free lesson

Track

Offensive Hacking

Scanning, enumeration, exploitation, and offensive techniques with Kali Linux.

intermediate
1 FREE LESSON
Scanning & Exploitation - The Offensive Phase
From first scans to structured enumeration: learn to observe, measure exposure, and turn results into actionable hypotheses.
23modules
21h 20m
Start free lesson
intermediate
1 FREE LESSON
Social Engineering & Phishing
Psychology, OSINT hygiene, awareness simulations, and countermeasures: understand how social engineering works, measure risk responsibly, and build defensive improvements.
11modules
10h 7m
Start free lesson
intermediate
1 FREE LESSON
Web Application Hacking
OWASP Top 10, secure testing methodology, and defensive understanding of common web risks (injection, XSS, SSRF, LFI, auth/session, APIs) using a lab-first, responsible approach.
12modules
10h 42m
Start free lesson

Track

Blue Team & Défense

Détection d'intrusion, analyse de logs, durcissement système, SIEM et forensique.

intermediate
1 FREE LESSON
Blue Team Ops — Detect, Block, Respond
Go defensive: learn to read logs, detect intrusions, harden systems, and analyze incidents like a real SOC analyst.
13modules
10h 5m
Start free lesson

Track

Advanced Hacking

Active Directory, Pass-the-Hash, Kerberoasting, Golden Ticket, DCSync et techniques avancées de compromission d'infrastructure Windows.

advanced
1 FREE LESSON
Hacking Windows & Active Directory: Pass-the-Hash, Mimikatz, and Pivoting
Master attack techniques for Windows and Active Directory environments: enumeration, Pass-the-Hash, Kerberoasting, Mimikatz, Golden Tickets, and DCSync.
14modules
11h 45m
Start free lesson
advanced
1 FREE LESSON
C2 & Post-Exploitation
Understand C2 architectures, practice post-exploitation and pivoting, and learn the fundamentals of persistence and tunneling.
12modules
9h 57m
Start free lesson
advanced
1 FREE LESSON
Privilege Escalation Linux
SUID, sudo abuse, cron jobs, capabilities, PATH hijacking, and kernel exploits: master privilege escalation on Linux.
10modules
8h 25m
Start free lesson
advanced
1 FREE LESSON
Privilege Escalation Windows
AlwaysInstallElevated, DLL hijacking, unquoted paths, SeImpersonatePrivilege, token abuse, and other privilege escalation techniques on Windows.
10modules
8h 26m
Start free lesson