30+ modules • theory + practical • CTF walkthrough • progress tracking
| Week | Modules covered |
|---|---|
| 1 | 1–5 (Intro, methodology basics) |
| 2 | 6–9 (Kill chain, recon, dorks, DNS/whois) |
| 3 | 10–13 (Social media recon, backend tech, subdomains, WAF) |
| 4 | 14–17 (NMAP, directory brute, Nessus, exploits) |
| 5 | 18–20 (Reverse shells, Metasploit basics & attacks) |
| 6 | 21–23 (Password attacks, SQLi, XSS) |
| 7 | 24–27 (Post‑exploitation, cracking, persistence, clearing tracks) |
| 8 | 28–30 (Anonymity, port forwarding, social engineering) |
| 9 | 31–33 (Instagram/OS phishing, final CTF) |