From reconnaissance to root — learn how to assess enterprise network infrastructure the way real attackers do. Nmap, Metasploit, lateral movement, and post-exploitation.
Network penetration testing is the core of offensive security. It's what most people think of when they hear "ethical hacking" — and for good reason. Networks are the backbone of every organization, and they're full of exploitable vulnerabilities.
This course teaches you the complete network pentesting methodology — from initial reconnaissance through exploitation, lateral movement, and post-exploitation. You'll use the same tools and techniques as professional pentesters on real-world engagements.
PTES, OSSTMM, and NIST frameworks. Scoping, rules of engagement, legal considerations, and professional ethics.
Passive and active reconnaissance. OSINT tools (Maltego, theHarvester, Shodan), DNS enumeration, and attack surface mapping.
Advanced Nmap techniques, service enumeration, SMB/LDAP/SNMP enumeration, and building a target network map.
Nessus, OpenVAS, and manual vulnerability identification. Prioritizing findings by exploitability and business impact.
Metasploit Framework deep dive — modules, payloads, encoders, meterpreter, and post-exploitation modules.
Hashcat, John the Ripper, credential spraying, pass-the-hash, Kerberoasting, and AS-REP roasting in Active Directory.
AD enumeration (BloodHound), privilege escalation paths, DCSync, Golden/Silver tickets, and domain compromise techniques.
Moving through networks post-compromise. SSH tunneling, proxychains, port forwarding, and maintaining access.
Data exfiltration techniques, persistence mechanisms, covering tracks, and writing professional network pentest reports.
Full network penetration test of a multi-machine enterprise lab. Compromise the domain controller from an unprivileged starting position.
Multi-machine lab with Windows Server, Active Directory, Linux servers, and network devices — mirrors real enterprise environments.
Structured challenges from single-machine exploits to full domain compromise, with increasing complexity.
Pre-configured Kali Linux with Nmap, Metasploit, BloodHound, Impacket, CrackMapExec, and more.
Lab access remains active for 12 months. New machines and scenarios added regularly.
One-time payment · Lifetime access to materials
Enroll Now Ask a Question💡 Part of the Intermediate Bundle
Get this + Web Pentesting for just ₹24,999 (save ₹2,999)
View Bundle →Flexible batch access — attend up to 3 batches within 12 months from enrollment.
Enroll in Network Pentesting