- Basics of penetration testing, network knowledge and understanding, phases and procedures, legal framework, best practices and procedural models, definitions of terms, distinctions between the different types of penetration tests, common vulnerabilities and exposures (CVE), what is an exploit (zero-day exploits) , Overview of common attack techniques
- Introduction to Kali Linux: Installation (Kali Linux, VM, Raspberry, Android), Available Tools (GUI, Command Line), Update and Maintenance
- Scanning the network: TCP/UDP port basics, network host, OS and service discovery methods and tools, port scanning methods, Nmap Scripting Engine (NSE), detailed analysis of systems in the network and checking for known vulnerabilities
- Sniffing and Spoofing: ARP and DNS Spoofing, DHCP Starvation Attack, Man in the Middle Attacks (MITM), Forging MAC Address
- Vulnerability analysis: Setting up and using vulnerability scanners
- Metasploit: Introduction to Metasploit modules (scanners, exploits, post modules, etc.), actively using the Metasploit Framework (configuring exploits, creating payloads and listeners, etc.), exploiting hacked systems (privilege escalation, process migration)
- Cracking Hashes and Passwords: Basics of Hash Functions, Password Hashes Salts, etc., Available Techniques and Tools, Retrieving Password Hashes, Creating Password Word Lists, Rainbow Tables, Exercises with Password Cracking Tools
- Repetitions, summary and many practical exercises