This path provides an overview of the concepts, tools, and techniques used in penetration testing, one of the most in-demand skills in cybersecurity. Learn about the role and fundamentals of pen testing, and explore tools and techniques used to identify vulnerabilities in systems and networks.
-
Learn about the role and how to become a penetration tester.
-
Learn fundamentals and frequently used tools of pen testing.
-
Explore intermediate and advanced pen testing concepts.
Courses
-
1
Cybersecurity Careers: Become a Penetration Tester36mCybersecurity Careers: Become a Penetration Tester
By: Tennisha Martin
Explore the skills and knowledge that you need in order to become a penetration tester (pen tester).
-
2
Introduction to Pen Testing for Cybersecurity Professionals1h 53mIntroduction to Pen Testing for Cybersecurity Professionals
By: Lisa Bock
Explore the fundamentals of using penetration testing to check for vulnerabilities in your computers, systems, networks, applications, and more.
-
3
Penetration Testing Essential Training2h 55mPenetration Testing Essential Training
By: Malcolm Shore
Penetration testing is an in-demand skill for cybersecurity professionals, and this course provides a solid hands-on overview of popular pen testing tools and techniques.
-
4
Kali Linux for Advanced Pen Testing and Ethical Hacking2h 44mKali Linux for Advanced Pen Testing and Ethical Hacking
By: Malcolm Shore
Learn how to use Kali Linux for advanced penetration testing, including stealthy testing, privilege escalation, tunneling and exfiltration, and pivoting.
-
5
Penetration Testing Web Apps with Kali and Burp Suite1h 54mPenetration Testing Web Apps with Kali and Burp Suite
By: Malcolm Shore
Take your pen testing skills to the next level. Learn how to locate and exploit website vulnerabilities with Burp Suite, sqlmap, and more.
-
6
Advanced Pen Testing Techniques for Active Directory1h 41mAdvanced Pen Testing Techniques for Active Directory
By: Malcolm Shore
Explore concrete, practical strategies for penetration testing Active Directory to prevent enterprise cybersecurity threats.
-
7
Burp Suite Essential Training1h 30mBurp Suite Essential Training
By: Malcolm Shore
Learn the basics of how to use Burp Suite, the popular web application penetration testing tool.
-
8
Stealth Penetration Testing with Advanced Enumeration1h 2mStealth Penetration Testing with Advanced Enumeration
By: Malcolm Shore
Explore the next phase of your career in ethical hacking with advanced techniques to safely enter and operate on more complex networks and systems.
Instructors
Tennisha Martin
Chairman & Founder @ BlackGirlsHack | 2025 Cyber Woman Hacker of Year | Fortune-Scale Ops Executive | Cybersecurity Education & AI Researcher | Keynote Speaker | Best-Selling Author |Philanthropist | On Sabbatical
Lisa Bock
Cybersecurity Author @ LinkedIn Learning | Certified Ethical Hacker, Penetration Testing | Speaker on Network Security & Threat Defense
Malcolm Shore
Cybersecurity and AI Consultant