Prepare to think like an attacker—and defend like a pro. This hands-on, scenario-driven course teaches modern penetration-testing methodologies and the ethical hacking skills needed to identify, exploit, and remediate real-world security vulnerabilities. Content is aligned with CompTIA Pentest+ (PT0-002) objectives and built around virtual cyber ranges and realistic attack simulations.
What you'll learn
- Plan and scope penetration tests using OSINT, reconnaissance, and scoping documentation.
- Execute attacks across multiple domains: network (Wi-Fi, AD), web applications (OWASP Top 10), APIs, and cloud services.
- Use industry tools and frameworks such as Kali Linux, Metasploit, Burp Suite, Nmap, Wireshark, Nessus, and more.
- Develop and validate exploit techniques, including custom scripting with Python and PowerShell.
- Analyze and prioritize findings with clear risk ratings and remediation guidance.
- Produce professional pentest deliverables: executive summaries, technical write-ups, and remediation roadmaps.
Course format & activities
- Immersive virtual cyber range labs and CTF-style challenges.
- Realistic attack simulations (network, web, API, and cloud).
- Practical labs using real tools and exploits in safe, legal environments.
- Weekly hands-on assignments and an ethics/chain-of-custody journal.
- Final capstone: a full-scope penetration test with a formal report and remediation plan.
By the end of this course, you'll be able to:
- Plan, execute, and document comprehensive penetration tests across networks, web apps, and cloud environments.
- Identify, exploit, and validate vulnerabilities using professional tools and custom scripts.
- Write clear, actionable reports with prioritized remediation strategies.
- Demonstrate readiness for the TestOut Pentest+ (and gain strong preparation for other pentest certifications).
- Pursue roles such as Penetration Tester, Ethical Hacker, Red Team Operator, or Security Consultant.
Expectations & requirements
- Complete weekly penetration labs and CTF challenges.
- Maintain an ethical hacking/logbook and adhere to strict legal & ethical guidelines.
- Pass performance assessments and submit a professional final pentest report.
.