Penetration Testing Course
Penetration Testing and Ethical Hacking
Enhance your skills by learning network scanning, vulnerability assessment, and ethical hacking through hands-on projects. Join this Penetration Testing Course and learn how to identify and fix security weaknesses.
Earn a certificate with an Academy Pro+ subscription

Stand out to recruiters

Share on professional channels

Globally recognised

Land your dream job

Course outline
Industry focussed curriculum designed by experts
Introduction to Penetration Testing
5 items
0.27 hr
- Learning Objectives
- Introduction to Penetration Testing
- Rules of Engagement
- Methodologies & Standards
- Threat Modeling
Planning and Preparation for Pen-Testing
8 items
1.39 hr
- Life Cycle and Planning for a Pen Test
- Gathering Requirements
- Introduction to Kali Linux
- Kali Linux Installation Demo
- Kali Linux Tool Suite
- Recon-ng Tool in Kali Linux
- Basic Kali Linux Terminal Commands
- Essential Kali Linux Terminal Commands
Reconnaissance
4 items
0.36 hr
- Introduction to Active and Passive Reconnaissance
- Passive Reconnaissance
- Scanning and Network Reconnaissance
- Scanning and Network Reconnaissance Demo
Vulnerability Assessment
2 items
0.31 hr
- Vulnerability Scanning and Enumeration
- Vulnerability Mapping
Exploitation
4 items
0.40 hr
- Introduction to Metasploit
- Metasploit - Demo
- Exploiting Eternal Blue Vulnerability
- Demo Metasploitable EternalBlue
Get access to the complete curriculum with your free trial
Start 7-Day Free TrialGuided Projects
Solve real-world projects in this Penetration Testing Course with a detailed step-by-step guide, starter code templates, and access to model solutions to improve your skills and build a standout resume.
- GUIDED PROJECT 1
- Vulnerability Assessment and Penetration Testing of a Local Network
- This project aims to provide students with hands-on experience in conducting a comprehensive vulnerability assessment and penetration testing on a local network environment. Students will utilize Kali Linux and various penetration testing tools to identify, exploit and report vulnerabilities in network systems, thereby enhancing their understanding of security measures and best practices.
- GUIDED PROJECT 2
- Exploitation Project Using Metasploit
- In this project, students will utilize the Metasploit framework to exploit a known vulnerability (such as the EternalBlue vulnerability) in a controlled environment. The project will guide them through the phases of setting up vulnerable systems, choosing appropriate exploits and conducting penetration testing to gain unauthorized access, culminating in a comprehensive report of the process and findings.
Gain skills & build your resume with complete access to guided projects in your free trial
Start 7-Day Free TrialCourse Instructors
Abdul Mateen
Information Security Analyst
Gain work-ready skills with an Academy Pro+ subscription
Get unlimited access to in-demand courses that get you noticed at work
Subscribe To Pro+ • $25/MonthShare your certificate online
Share your professional certificate & updated resume on LinkedIn


Learn from the best
Taught by top faculty & industry experts


Learn by doing
Apply skills with guided projects and interactive coding exercises
AI Mock Interviews
30+ Guided Projects
500+ Coding Exercises

Learn with AI
Get AI-powered coding hints & instant doubt resolution
24x7 Doubt resolution
Coding Hints
Advance your career with
Top University programs
Gain industry-relevant skills through learning from top faculty, guidance from industry mentors, and hands-on projects.






MIT Professional Education
12 Weeks  • Online









McCombs School of Business at The University of Texas at Austin
7 months  • Online



McCombs School of Business at The University of Texas at Austin
7 months  • Online



McCombs School of Business at The University of Texas at Austin
6 months  • Online



Frequently Asked Questions
Who can enroll in this penetration testing course online?
The course is ideal to beginners, IT professionals, and those who are interested in ethical hacking and cybersecurity. There is no experience required to begin this penetration testing training course.
What will I learn in this penetration testing training course?
You will gain knowledge on how to set up Kali Linux, how to issue commands, active reconnaissance, passive reconnaissance, vulnerability scan, exploitation with metasploit, post exploitation methods and defense evasion measures.
What practical skills will I gain from this pentesting course?
By the end of this course, you will be in a position to carry out vulnerability testing, visualize network vulnerabilities, safely exploit vulnerabilities, and carry out defense evasion. You will also learn how to use Kali Linux tools.
Does the course include practical projects?
Yes. Two hands-on projects are included:
These projects provide applied experience and help build portfolio-ready work.
Do I need any prior knowledge of cybersecurity to join this penetration testing course?
No. The course begins with the basics and gradually proceeds to advanced methods of penetration testing, which is why it is not that complicated to begin with and is rather appropriate to all beginners and intermediate learners.