image
learning pathPractical Deep Dive into Pentesting & Privilege Escalation
Intermediate
10 hours
175
5/5
Build hands-on tech skillsImprove theoretical and practical skills needed in real-world scenarios.
Enroll to stay on trackSelect a due date and we will help you stay on track with custom reminders and weekly progress reports.
Earn a certificate of completionShow your skills and build your credibility when you include them in your resume and LinkedIn profile.

Training content

8
1
Course - Beginner - 5m
Learning Path Introduction
This course introduces the Practical Deep Dive into Pentesting & Privilege Escalation learning path and covers what you will learn and what you should already know before you begin.
2
Course - Intermediate - 3h 8m
Penetration Testing and Privilege Escalation with Bandit
This course will walk you through a variety of exercises and techniques as part of a capture the flag (CTF) game called Bandit.
3
Course - Intermediate - 1h 7m
Pentesting and Privilege Escalation with Wakanda
This course will walk you through how to solve a number of tasks as part of a capture-the-flag (CTF) game called Wakanda. You will learn the necessary skills to excel in penetration testing and privilege escalation.
4
Course - Intermediate - 1h 21m
Pentesting and Privilege Escalation with Mr. Robot
In this course, we explore brute force attacks, hacking WordPress, changing users, and suid privilege escalation. We'll do this through a CTF (capture the flag) game called Mr. Robot.
5
Course - Intermediate - 1h 1m
Pentesting and Privilege Escalation with FristiLeaks
In this course, we solve a vulnerable virtual machine called FristiLeaks in order to explore pentesting and privilege escalation techniques.
6
Course - Intermediate - 2h 29m
Deep Dive into Privilege Escalation on Linux
This course explores how to carry out privilege escalation on Linux machines. We look at enumeration, kernel exploits, sudo list, suid, crontab, and much more!
7
Course - Intermediate - 58m
Pentesting and Privilege Escalation with Arctic
In this course, we explore pentesting and privilege escalation as we solve a Windows virtual machine called Arctic.

This training will be a completely hands-on experience but without neglecting the theory. We will cover a lot of scenarios when we solve vulnerable machines which you will encounter a lot during pentests and certification exams. This will be a big step for you to advance your cyber security career.

In the Windows pentest & privilege escalation sections, you will need a Hack The Box membership. If you do not want to pay for that, you can always watch the last two sections and simply take notes, without exercising. However, carrying out the exercises is the best way to learn the techniques covered in that course.

Learning Objectives

  • Penetration testing
  • Privilege escalation for Windows
  • Privilege escalation for Linux
  • Learn solutions to a range of capture-the-flag ethical hacking games

Intended Audience

  • Anyone who wants to learn about pentesting and privilege escalation
  • Anyone looking to transition into a cybersecurity role

Prerequisites

To get the most out of this course, you should already have some familiarity with ethical hacking. You should also have a working Kali Linux or a counterpart system already set up.

Your certificate for this learning path
Students
1422
Courses
55
Learning Paths
3

Atil is an instructor at Bogazici University, where he graduated back in 2010. He is also co-founder of Academy Club, which provides training, and Pera Games, which operates in the mobile gaming industry.