From Recon To Report Writing

With more than ten years of experience in teaching, Windows and Linux system administration, software development and ethical hacking I present to you "Perfoming Professional Web Penetration Tests"


This is one of the few ethical hacking courses available worldwide that covers the planning and execution of sophisticated web penetration tests starting off from reconnaissance up until the writing of the final report.










A spiritual successor to "Learn Web Application Penetration Testing From %00", this course will delve much deeper exploting also:

  • system administration elements with Docker
  • privilege escalation
  • manual exploitation of the hardest vulnerabilities
  • the drafting of the final report of a professional penetration test

The course also includes:

  •  An example of a final report of the penetration testing engagement in PDF format
  •  More than 1'000 solution of vulnerable virtual machines: foothold and privilege escalation attack vectors of more than 2'000 CVE's are included, in two humongous PDF files. 

Curriculum

  1 Intro And Lab Setup
Available in days
days after you enroll
  2 Reconnaissance And OSINT
Available in days
days after you enroll
  3 Vulnerability Scanners
Available in days
days after you enroll
  4 Exploitation (OWASP Top Ten)
Available in days
days after you enroll
  5 Privilege Escalation
Available in days
days after you enroll
  6 Final Report Writing
Available in days
days after you enroll
  7 Conclusion
Available in days
days after you enroll

Choose a Pricing Option

FAQ


Can I get a refund if I'm not satisfied?

Teachable has a 14-day satisfaction guarantee from the purchase date of any course, it is also possible to pay for the course in three convenient installments.


I have a question about the courses or a technical issue, how can I contact you?

Send me an email at a.gattabuia [at] primeradsec.com.


Can I take the course on a MacBook with an M1 architecture?

Some exploits may not compile with gcc and you’ll need to build them using a PC with an Intel processor; alternatively you can use the UTM hypervisor on Mac.

You can follow the full course with an M1 or M2 processor but the Metasploitable 3 vulnerable virtual machine running Windows Server 2008 needs to be installed on a device with an Intel architecture as it's very unstable even if emulated.