Module 1: Introduction to Pentesting and Information Security
Module 2: Networking
Module 3: Bash Scripting
Module 4: Web Applications
Module 5: Reconnaissance & Information Gathering
Module 6: Footprinting and Scanning
Module 7: Advanced Scanning Techniques
Module 8: Vulnerability Assessment
Module 9: Network Attacks
9.1 Authentication Cracking
9.2 Windows Shares
9.3 Null Sessions
9.4 ARP Poisoning
9.5 Metasploit
9.6 Meterpreter
9.7 Privilege Escalation
9.8 Antivirus Evasion
Module 10: Anonymity
Module 11: System Attacks
11.1 Malware
11.2 Password Attacks
11.3 Buffer Overflow
Module 12: Web Attacks
Module 13: Active Directory Attacks
Module 14: Next Steps
Module 15: Penetration Testing and Capture the Flag (CTF) Labs
IMPORTANT:
This course provides education in cybersecurity techniques strictly for defensive purposes. All skills, tools, and methodologies taught (including vulnerability scanning, exploitation, password cracking, and network attacks) are intended to:
Strengthen cybersecurity defenses
Conduct authorized security assessments
Promote ethical hacking practices
Participants MUST agree to:
Use these skills only in legal environments (e.g., owned labs, CTF platforms, or with explicit written permission).
NEVER attack systems without formal authorization.
Comply with all applicable laws (e.g., Computer Fraud and Abuse Act, GDPR, local cybersecurity regulations).
Unethical or unauthorized use of these techniques may result in:
Legal prosecution
Immediate course termination
Civil/criminal liability
By enrolling, you confirm understanding of these terms and accept full responsibility for your actions.
🔒 Ethical Use Only: Skills taught in this course are for authorized penetration testing and defensive cybersecurity. Unauthorized system access is illegal. Participants assume all legal responsibility for their actions.
Authorization Requirement:
"All hacking techniques must be practiced exclusively in controlled, self-owned environments or with documented third-party consent."
Prohibited Actions:
"Reverse engineering, malware deployment, or attacking public/private networks without authorization is strictly forbidden."
Consequences:
"Violators will be reported to authorities and face permanent removal from the course without refund."
Industry Compliance:
"Curriculum aligns with offensive security certifications (e.g., OSCP, CEH) and emphasizes compliance with EC-Council/OffSec ethical guidelines."
Enrollment forms
Course syllabus (Page 1)
Lab access portals
Video introductions
Student certification agreements
Let me know if you need it adapted for a specific format (PDF, webpage, etc.). Always consult a legal professional for binding agreements.