Course
From first scans to structured enumeration: learn to observe, measure exposure, and turn results into actionable hypotheses.
Structured path preview
1 free lesson to get started, then 22 premium lessons with exercises, scenarios, and detailed solutions.
First locked checkpoint: Scanning Techniques — Visibility, Detection, and Limits
Lessons
23
Completed
0
Progress
0%
Lessons
Lesson 01
Your First Network Scan — Understanding Before Using Nmap
Free
Lesson 02
Scanning Techniques — Visibility, Detection, and Limits
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 03
Advanced Enumeration with NSE
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 04
From Version to CVE — Turning a Discovery into Risk
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 01
Understanding Exploitation — Exploits, Payloads, and Shellcode
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 02
Introduction to Metasploit
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 03
First Exploits on Vulnerable Targets
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 04
Manual Exploitation Without Metasploit
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 05
Basic Post-Exploitation
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 06
Vulnerability Reporting and Prioritization
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 01
Analyzing a web application: reading weak signals
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 02
Analyzing a web application: headers, technologies, and entry points
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 03
Nikto — Scanning Web Vulnerabilities
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 01
Exploiting Weak Passwords with Hydra
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 02
Basic SQL Injection
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 03
XSS: Reflected and Stored Cross-Site Scripting
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 04
Hash cracking with Hashcat
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 05
Exploiting Misconfigured Services
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 01
Linux Privilege Escalation
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 02
Persistence and Trace Management
Members only
Unlock exercises, detailed solutions, and the next steps.
Lesson 03
Understanding pivoting
Members only
Unlock exercises, detailed solutions, and the next steps.