Intermediate · 6 Weeks · ₹14,999

Network Penetration
Testing

From reconnaissance to root — learn how to assess enterprise network infrastructure the way real attackers do. Nmap, Metasploit, lateral movement, and post-exploitation.

Enroll Now — ₹14,999 View All Courses

Think Like a Network
Attacker

Network penetration testing is the core of offensive security. It's what most people think of when they hear "ethical hacking" — and for good reason. Networks are the backbone of every organization, and they're full of exploitable vulnerabilities.

This course teaches you the complete network pentesting methodology — from initial reconnaissance through exploitation, lateral movement, and post-exploitation. You'll use the same tools and techniques as professional pentesters on real-world engagements.

Prerequisites & Target Audience

✅ IT professionals wanting to understand attacker techniques
✅ Security analysts moving into offensive security roles
✅ Students preparing for OSCP, CEH, or eJPT certifications
✅ Network admins who want to test their own infrastructure

Course Modules

1

Penetration Testing Methodology

PTES, OSSTMM, and NIST frameworks. Scoping, rules of engagement, legal considerations, and professional ethics.

2

Reconnaissance & OSINT

Passive and active reconnaissance. OSINT tools (Maltego, theHarvester, Shodan), DNS enumeration, and attack surface mapping.

3

Network Scanning & Enumeration

Advanced Nmap techniques, service enumeration, SMB/LDAP/SNMP enumeration, and building a target network map.

4

Vulnerability Assessment

Nessus, OpenVAS, and manual vulnerability identification. Prioritizing findings by exploitability and business impact.

5

Exploitation with Metasploit

Metasploit Framework deep dive — modules, payloads, encoders, meterpreter, and post-exploitation modules.

6

Password Attacks

Hashcat, John the Ripper, credential spraying, pass-the-hash, Kerberoasting, and AS-REP roasting in Active Directory.

7

Active Directory Attacks

AD enumeration (BloodHound), privilege escalation paths, DCSync, Golden/Silver tickets, and domain compromise techniques.

8

Lateral Movement & Pivoting

Moving through networks post-compromise. SSH tunneling, proxychains, port forwarding, and maintaining access.

9

Post-Exploitation & Reporting

Data exfiltration techniques, persistence mechanisms, covering tracks, and writing professional network pentest reports.

10

Capstone Lab

Full network penetration test of a multi-machine enterprise lab. Compromise the domain controller from an unprivileged starting position.

Hands-On Lab Environment

🏢

Enterprise Network Lab

Multi-machine lab with Windows Server, Active Directory, Linux servers, and network devices — mirrors real enterprise environments.

🎯

Progressive Challenges

Structured challenges from single-machine exploits to full domain compromise, with increasing complexity.

🔧

Tool Arsenal

Pre-configured Kali Linux with Nmap, Metasploit, BloodHound, Impacket, CrackMapExec, and more.

12-Month Access

Lab access remains active for 12 months. New machines and scenarios added regularly.

₹14,999

One-time payment · Lifetime access to materials

Enroll Now Ask a Question
Duration6 Weeks
LevelIntermediate
Batch Access3 Batches / 12mo
Lab Access✅ Included
Study Notes✅ Included
Recordings✅ Included
Certificate✅ On Completion

💡 Part of the Intermediate Bundle

Get this + Web Pentesting for just ₹24,999 (save ₹2,999)

View Bundle →

Own the Network. Own the Assessment.

Flexible batch access — attend up to 3 batches within 12 months from enrollment.

Enroll in Network Pentesting
🛡️ Request Assessment