Skills › Cybersecurity

Ethical Hacking & Pen Testing

Perform structured penetration tests — recon, exploitation, and reporting.

intermediate 🔐 Cybersecurity
0%
Confidence · no data yet
Sign in to track

After this skill you can…

  • Conduct a full pen test with Kali Linux
  • Use Metasploit for exploitation in lab environments
  • Write a professional penetration test report

Prerequisites

Learn this skill (10 videos)

Tips for Finding Your First CVE!
The Cyber Mentor · beginner
Start Web App Pentesting for FREE (Legally!)
The Cyber Mentor · beginner
3 Ways to Find and Exploit Command Injection
The Cyber Mentor · beginner
Hacking Google Cloud?
LiveOverflow · beginner
Trying to Find a Bug in WordPress
LiveOverflow · beginner
Authentication Bypass Using Root Array
LiveOverflow · beginner
Practical Bug Bounty Course Launch
The Cyber Mentor · beginner
How I Found My First Bug (now you can too)
The Cyber Mentor · beginner