All current Penetration Testing Courses courses in 2024
68 Courses
Open Source Intelligence (OSINT) Fundamentals
If you've been exposed to cybersecurity, especially in the realm of Social Engineering, you're likely familiar with OSINT, or Open Source Intelligence. This OSINT course is meticulously designed to offer a foundational grasp of OSINT by covering:
The essence of OSINT
The primary users of OSINT
The ethical and moral considerations in utilizing O.
Social Engineering
This course covers basic information about social engineering. In this course several fake social media profiles will be explored and students will have an opportunity to craft their very own phishing email and malicious payload using the Social Engineering Toolkit (SET) in a Kali Linux virtual environment, then play the “victim” by opening the ma.
Enterprise Security: Policies, Practices, and Procedures
As a cybersecurity analyst, you must be able to show the value of security intelligence and threat analysis. This course will teach you the foundational skills required as a CySA+ professional including threat hunting, data privacy, and risk mitigation.Most companies are "reactive" instead of "proactive" when it comes to securing their networks, re.

Attacks, Threats, and Vulnerabilities for CompTIA Security+
This course will teach you the fundamentals and key concepts around the threats, attacks, and vulnerabilities your organization is likely to face. More importantly you’re learn how to mitigate those risks and protect your organization.In this course, you’ll learn about the various threats faced by social engineering techniques like phishing, pharmi.

Ethical Hacking & Penetration Testing with Metasploit
Ethical Hacking course and Penetration Testing incl. Metasploit, Password Cracking, Web Hacking, Phishing, NMAP, Nessus

Penetration Testing: Planning, Scoping, and Recon
This course will teach you what specific parts are required within the pre-engagement documentation and how to perform the initial investigation of the target while only using open-source intelligence and passive reconnaissance methods. Before you can start your penetration tests there are a lot of things that come to mind. What documents are neede.

Ethical Hacking with Metasploit: Exploit & Post Exploit
Learn Ethical Hacking from scratch with Metasploit, exploit vulnerabilities and become a white hat hacker | Ethical 2022

Ethical Hacking: Become Ethical Hacker | Penetration Testing
Ethical Hacking | Penetration Testing, Bug Bounty and Ethical Hacking skills for your Certified Ethical Hacker career
