Example Curriculum

  1.Introduction
Available in days
days after you enroll
  2.THE 3 TEAMS
Available in days
days after you enroll
  3.PENETRATION TESTING PROCESS
Available in days
days after you enroll
  4.THE WINDOWS OPERATING SYSTEM
Available in days
days after you enroll
  5.WINDOWS INTERNALS
Available in days
days after you enroll
  6.WINDOWS COMMAND LINE
Available in days
days after you enroll
  7.THE LINUX OPERATING SYSTEM
Available in days
days after you enroll
  8.OPERATING SYSTEM INTERNALS
Available in days
days after you enroll
  9.ACTIVE DIRECTORY
Available in days
days after you enroll
  10.KERBEROS
Available in days
days after you enroll
  11.DATA MANIPULATION
Available in days
days after you enroll
  12.NETWORKING
Available in days
days after you enroll
  13.VPNS
Available in days
days after you enroll
  14.FIREWALLS
Available in days
days after you enroll
  15.CONFIGURING PFSENSE FIREWALLS
Available in days
days after you enroll
  16.PROGRAM THEORY
Available in days
days after you enroll
  17.PYTHON COURSE
Available in days
days after you enroll
  18.ASSEMBLY COURSE
Available in days
days after you enroll
  19.SCOPE IDENTIFICATION
Available in days
days after you enroll
  20.RECONNAISSANCE
Available in days
days after you enroll
  21.EXPLOITATION
Available in days
days after you enroll
  22.POST EXPLOITATION
Available in days
days after you enroll
  23.PASSWORD CRACKING
Available in days
days after you enroll
  24.COVERING YOUR TRACKS
Available in days
days after you enroll
  25.REPORTING
Available in days
days after you enroll
  26.ATTACKING ACTIVE DIRECTORY (REALISTIC SCENARIO)
Available in days
days after you enroll
  27.JOB HUNTING
Available in days
days after you enroll

This course is closed for enrollment.