This path provides an overview of the concepts, tools, and techniques used in penetration testing, one of the most in-demand skills in cybersecurity. Learn about the role and fundamentals of pen testing, and explore tools and techniques used to identify vulnerabilities in systems and networks.
-
Learn about the role and how to become a penetration tester.
-
Learn fundamentals and frequently used tools of pen testing.
-
Explore intermediate and advanced pen testing concepts.
Courses
-
1
Cybersecurity Careers: Become a Penetration Tester36mCybersecurity Careers: Become a Penetration Tester
By: Tennisha Martin
Explore the skills and knowledge that you need in order to become a penetration tester (pen tester).
-
2
Introduction to Pen Testing for Cybersecurity Professionals1h 53mIntroduction to Pen Testing for Cybersecurity Professionals
By: Lisa Bock
Explore the fundamentals of using penetration testing to check for vulnerabilities in your computers, systems, networks, applications, and more.
-
3
Penetration Testing Essential Training2h 55mPenetration Testing Essential Training
By: Malcolm Shore
Penetration testing is an in-demand skill for cybersecurity professionals, and this course provides a solid hands-on overview of popular pen testing tools and techniques.
-
4
Kali Linux for Advanced Pen Testing and Ethical Hacking2h 44mKali Linux for Advanced Pen Testing and Ethical Hacking
By: Malcolm Shore
Learn how to use Kali Linux for advanced penetration testing, including stealthy testing, privilege escalation, tunneling and exfiltration, and pivoting.
-
5
Penetration Testing Web Apps with Kali and Burp Suite1h 54mPenetration Testing Web Apps with Kali and Burp Suite
By: Malcolm Shore
Take your pen testing skills to the next level. Learn how to locate and exploit website vulnerabilities with Burp Suite, sqlmap, and more.
-
6
Advanced Pen Testing Techniques for Active Directory1h 41mAdvanced Pen Testing Techniques for Active Directory
By: Malcolm Shore
Explore concrete, practical strategies for penetration testing Active Directory to prevent enterprise cybersecurity threats.
-
7
Burp Suite Essential Training1h 30mBurp Suite Essential Training
By: Malcolm Shore
Learn the basics of how to use Burp Suite, the popular web application penetration testing tool.
-
8
Stealth Penetration Testing with Advanced Enumeration1h 2mStealth Penetration Testing with Advanced Enumeration
By: Malcolm Shore
Explore the next phase of your career in ethical hacking with advanced techniques to safely enter and operate on more complex networks and systems.
Instructors
Tennisha Martin
Chairman of the Board and Founder @ BlackGirlsHack | 2025 Cyber Woman Hacker of Year | Sr Mgr | Cybersecurity Edu & AI Researcher | Keynote Speaker and Best Selling Author | Philanthropist | Ethical Hacking… Explained
Lisa Bock
Cybersecurity Author @ LinkedIn | Certified Ethical Hacker, Penetration Testing
Malcolm Shore
Cybersecurity and AI Consultant