Udacity Logo
Log InSign Up

Penetration Testing and Red Teaming

Course

The purpose of this course is to take a deep dive into the specific technique of penetration testing and how it can be used to perform a cybersecurity assessment on a specific system and conducted as a part of a specific penetration testing project within an organization to identify vulnerabilities, flaws and risks.

The purpose of this course is to take a deep dive into the specific technique of penetration testing and how it can be used to perform a cybersecurity assessment on a specific system and conducted as a part of a specific penetration testing project within an organization to identify vulnerabilities, flaws and risks.

4 weeks

Real-world Projects

Completion Certificate

Last Updated May 22, 2023

Prerequisites:

No experience required

Course Lessons

Lesson 1

Intro to Penetration Testing & Red Team Operations

Brief introduction and foundational knowledge around penetration testing and red teaming.

Lesson 2

Reconnaissance

In this lesson, we will dive into the first step of penetration testing which focusses on gathering information and data about the target, also known as Reconnaissance.

Lesson 3

Scanning & Research

In this lesson, we will use the information we obtained in reconnaissance to become informed and plan how to breach the target.

Lesson 4

Gaining Access

In this lesson, we will now execute on the information we have from reconnaissance, scanning, and research and will now execute on the plan of how to gain access on the target.

Lesson 5

Maintaining Access

In this lesson, we will learn how to maintain the access that we just go on the target.

Lesson 6

Covering Tracks & Reporting

In this lesson, we will learn how to stay under the radar of the target and not be noticed. And we will also organize all our thoughts in a final comprehensive report.

Lesson 7 • Project

Red Teaming Operations

This project will have you go through modern penetration tester and red teamer methodologies. You will create a documentation and testing efforts to generate a report in a timely fashion.

Taught By The Best

Photo of Paul Oyelakin

Paul Oyelakin

Founder of PJ Pros

Paul Oyelakin is the founder of PJ Professional IT Services. He has experience in security compliance, penetration testing, and architecting network security solutions for business and government. He has an MBA, MS in Cybersecurity, and is a Certified Ethical Hacker & Information System Security Professional.

Taught By The Best

Photo of Paul Oyelakin

Paul Oyelakin

Founder of PJ Pros

Paul Oyelakin is the founder of PJ Professional IT Services. He has experience in security compliance, penetration testing, and architecting network security solutions for business and government. He has an MBA, MS in Cybersecurity, and is a Certified Ethical Hacker & Information System Security Professional.

Get Started Today

Penetration Testing and Red Teaming