Free Course Image Network Penetration Testing Course

Free online courseNetwork Penetration Testing Course

Duration of the online course: 28 hours and 44 minutes

New

Launch your pentesting skills with a free course on network attacks, scanning and AD basics—practice real techniques and boost your cybersecurity career fast.

In this free course, learn about

  • Pentest workflow: 5 phases, engagement mindset, and effective note-keeping practices
  • Linux fundamentals for pentesting: filesystem, permissions, networking basics, and CLI usage
  • Python basics: syntax, data types, functions, and when to use for vs while loops
  • Build simple security scripts in Python, including a basic (inefficient) port scanner
  • Password security principles: why strong passwords matter and common credential attacks
  • Passive OSINT techniques and how they fit into reconnaissance for ethical hacking
  • Core scanning tools and use cases: Nmap, Nessus, Burp Suite and common scan strategies
  • Enumeration methodology (e.g., Kioptrix-style) to identify services, users, and attack paths
  • Exploitation basics: getting shells, post-exploit actions, and credential stuffing concepts
  • Internal vs external pentests: scope, goals, and how objectives differ in each context
  • Active Directory lab building; LLMNR poisoning; NTLMv2 hash cracking with Hashcat
  • AD attack techniques: NTLM relay, pass-the-hash, token impersonation, PsExec, Kerberoasting
  • SMB signing impact: why disabling it enables relay attacks and increases lateral movement risk
  • Operational skills: file transfers, pivoting, and writing reports incl. Rules of Engagement

Course Description

Build job-ready skills in network penetration testing by learning how attackers think and how defenders can validate real risk. This free online course guides you from essential foundations to hands-on techniques used in real engagements, helping you develop the confidence to assess networks methodically rather than guessing your way through tools. Along the way, you will strengthen the practical habits that matter in security work, such as keeping clear notes, staying organized during testing, and communicating findings responsibly.

You will start by establishing a solid base with Linux fundamentals and scripting concepts, then use Python to understand automation and why small utilities can accelerate reconnaissance and troubleshooting. As the course advances, you will approach penetration testing as a repeatable process: gathering information, mapping an environment, identifying weaknesses, and moving carefully through verification. The emphasis is on learning how and why techniques work so you can adapt to different targets instead of memorizing steps.

As you progress, you will practice scanning and enumeration workflows that help you discover services, versions, and misconfigurations efficiently, while also learning common ways testers reduce noise and avoid drawing unnecessary attention during assessments. You will explore the difference between external and internal perspectives, understand why scope and intent change the approach, and develop a clearer sense of how real organizations validate exposure across their systems.

The course also brings you into the realities of modern enterprise networks, including Active Directory attack paths and the kinds of issues that turn small weaknesses into major compromises. You will learn the logic behind credential-focused techniques, relays, cracking strategies, token-based abuse, and common misconfigurations that can enable lateral movement and privilege escalation. Concepts are tied to practical lab-style thinking so you can connect actions to outcomes and understand the risks being demonstrated.

Finally, you will see how professional testing is completed: transferring files safely in a lab context, pivoting through network segments, and turning technical discoveries into reporting that stakeholders can act on. You will also learn why Rules of Engagement and clear authorization are critical to ethical security testing. By the end, you will have a stronger foundation for interviews, personal labs, and next-step certifications, with a practical mindset geared toward responsible, measurable cybersecurity improvement.

Course content

  • Video class: Zero to Hero Pentesting: Episode 1 - Course Introduction, Notekeeping, Introductory Linux, and AMA 4h08m
  • Exercise: What is the primary focus of the Zero to Hero Pentesting Course outlined in the transcript?
  • Video class: Zero to Hero Pentesting: Episode 2 - Python 101 2h49m
  • Exercise: What is the main difference between for loops and while loops in Python?
  • Video class: Zero to Hero Pentesting: Episode 3 - Python 102, Building a Terrible Port Scanner, and a Giveaway 2h34m
  • Exercise: What are the benefits of using strong passwords in cybersecurity?
  • Video class: Zero to Hero Pentesting: Episode 4 - Five Phases of Hacking Passive OSINT 3h04m
  • Exercise: What are common methods used in Network Penetration Testing to avoid detection and ensure stealth?
  • Video class: Zero to Hero Pentesting: Episode 5 - Scanning Tools (Nmap, Nessus, BurpSuite, etc.) 3h07m
  • Exercise: What is Network Penetration Testing often abbreviated as?
  • Video class: Zero to Hero Pentesting: Episode 6 - Enumeration (Kioptrix 2h48m
  • Exercise: Which certification would you recommend as a follow-up to the Security+ certification if someone has four or five years of security experience and is aiming for a career in penetration testing?
  • Video class: Zero to Hero Pentesting: Episode 7 - Exploitation, Shells, and Some Credential Stuffing 2h47m
  • Exercise: What is the purpose of an internal penetration test compared to an external penetration test?
  • Video class: Zero to Hero: Week 8 - Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat 2h16m
  • Exercise: What are some common methods employed in network penetration testing to escalate privileges within an Active Directory environment?
  • Video class: Zero to Hero: Week 9 - NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more 2h08m
  • Exercise: What is the purpose of disabling SMB signing in an Active Directory environment from a penetration tester's perspective?
  • Video class: Zero to Hero: Episode 10 - MS17-010/EternalBlue, GPP/cPasswords, and Kerberoasting 1h32m
  • Exercise: When conducting network penetration testing, which of the following is NOT an objective?
  • Video class: Zero to Hero: Week 11 - File Transfers, Pivoting, and Reporting Writing 1h25m
  • Exercise: What is the purpose of a Rules of Engagement document in a penetration testing process?

This free course includes:

28 hours and 44 minutes of online video course

Digital certificate of course completion (Free)

Exercises to train your knowledge

100% free, from content to certificate

Ready to get started?Download the app and get started today.

Install the app now

to access the course
Icon representing technology and business courses

Over 5,000 free courses

Programming, English, Digital Marketing and much more! Learn whatever you want, for free.

Calendar icon with target representing study planning

Study plan with AI

Our app's Artificial Intelligence can create a study schedule for the course you choose.

Professional icon representing career and business

From zero to professional success

Improve your resume with our free Certificate and then use our Artificial Intelligence to find your dream job.

You can also use the QR Code or the links below.

QR Code - Download Cursa - Online Courses

More free courses at Cyber Security

Free Ebook + Audiobooks! Learn by listening or reading!

Download the App now to have access to + 5000 free courses, exercises, certificates and lots of content without paying anything!

  • 100% free online courses from start to finish

    Thousands of online courses in video, ebooks and audiobooks.

  • More than 60 thousand free exercises

    To test your knowledge during online courses

  • Valid free Digital Certificate with QR Code

    Generated directly from your cell phone's photo gallery and sent to your email

Cursa app on the ebook screen, the video course screen and the course exercises screen, plus the course completion certificate