Lesson 1
Intro to Penetration Testing & Red Team Operations
Brief introduction and foundational knowledge around penetration testing and red teaming.
Course
The purpose of this course is to take a deep dive into the specific technique of penetration testing and how it can be used to perform a cybersecurity assessment on a specific system and conducted as a part of a specific penetration testing project within an organization to identify vulnerabilities, flaws and risks.
The purpose of this course is to take a deep dive into the specific technique of penetration testing and how it can be used to perform a cybersecurity assessment on a specific system and conducted as a part of a specific penetration testing project within an organization to identify vulnerabilities, flaws and risks.
4 weeks
Real-world Projects
Completion Certificate
Last Updated May 22, 2023
No experience required
Lesson 1
Intro to Penetration Testing & Red Team Operations
Brief introduction and foundational knowledge around penetration testing and red teaming.
Lesson 2
Reconnaissance
In this lesson, we will dive into the first step of penetration testing which focusses on gathering information and data about the target, also known as Reconnaissance.
Lesson 3
Scanning & Research
In this lesson, we will use the information we obtained in reconnaissance to become informed and plan how to breach the target.
Lesson 4
Gaining Access
In this lesson, we will now execute on the information we have from reconnaissance, scanning, and research and will now execute on the plan of how to gain access on the target.
Lesson 5
Maintaining Access
In this lesson, we will learn how to maintain the access that we just go on the target.
Lesson 6
Covering Tracks & Reporting
In this lesson, we will learn how to stay under the radar of the target and not be noticed. And we will also organize all our thoughts in a final comprehensive report.
Lesson 7 • Project
Red Teaming Operations
This project will have you go through modern penetration tester and red teamer methodologies. You will create a documentation and testing efforts to generate a report in a timely fashion.
Paul Oyelakin
Founder of PJ Pros
Paul Oyelakin is the founder of PJ Professional IT Services. He has experience in security compliance, penetration testing, and architecting network security solutions for business and government. He has an MBA, MS in Cybersecurity, and is a Certified Ethical Hacker & Information System Security Professional.
Paul Oyelakin
Founder of PJ Pros
Paul Oyelakin is the founder of PJ Professional IT Services. He has experience in security compliance, penetration testing, and architecting network security solutions for business and government. He has an MBA, MS in Cybersecurity, and is a Certified Ethical Hacker & Information System Security Professional.
Get Started Today