Network penetration testing course focuses on finding out flaws in a network and actually exploiting them with the help of Kali Linux and Metasploit. hackerSlash is proud to be listed among the best network penetration testing institute. 


Before you enroll for network Penetration testing training in hackerSlash you should know about ethical hacking. Or you can enroll for the ethical hacking training course and CCNA. Penetration testing is a process of evaluating an organizational IT infrastructure by exploiting vulnerabilities that may exist in an operating system, service, or application loopholes. These assessments are done by organizations to evaluate the defense mechanism of the IT infrastructure. In the network penetration testing course in hackerSlash, one will learn how to carry out a successful penetration test that actually mimics the real-world attack and generate a vulnerability assessment and penetration testing report for the organization.

 With the rise in cyber-attack worldwide, organizations have started investing billions to follow the security best practices and IT security compliances (GLBA, NCUA, FFIEC, HIPAA, etc.) As these best practices require a regular assessment of external and internal networks our penetration testing course prepares individuals to conduct successful pen test and generate VAPT report for organizations.

Our certified network penetration testing course in hackerSlash will help you to learn the tricks to conduct successful reconnaissance and use your social engineering skills to gain knowledge about the target network infrastructure. Learning the skills from the best professional white hat hackers and using the most updated tools will make you industry ready.





# Basic Ethical Hacking like CEHv11 or our SlashOHS course.



Course Syllabus

Module 1: Introduction to Network Penetration Testing 

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. 


Module 2: Penetration Testing Lab Setup

 According to the configuration of Laptop, 32/64 bit, provide VMware, and any Penetration testing OS like Kali/Parrot, Windows XP SP3, Windows 7


Module 3: Deep Information Gathering

Active Information Gathering in depth, Passive Information Gathering in depth, Sniffing, Vulnerability Scanning


Module 4: Penetration Testing

  • Exploiting Windows and Linux System
  • Application of Metasploit
  • Creating malicious files (standalone binaries) using msfvenom
  • Remote Exploit
  • Evading Antivirus
  • Uac Bypass
  • Exploiting using different File Format
  • Post Exploitation


Module 5: Android Hacking

Here students will learn how to hack a android device and get details out of it.


Module 6:  Sniffing & MITM

Studying ARP, how it works and how it can be manipulated to mount sophisticated attacks is made extremely easy to understand. Sniffing is a technique that you will be able to fully grasp in its most practical aspects. We will make sure you have enough basics of network theory before we cover actual attack scenarios using the best tools available. Man in the middle attacks are one of the most used penetration testing techniques today; you will be able to mount man in the middle attacks within local networks and over the Internet.  


Module 7: Anonymity

Penetration testers rarely need to cover their tracks. However there are times when testing the efficiency of the target organization incident response team is within the scope of a Penetration tester’s engagement.  


Module 8: Social Engineering

Social engineering module will guide you through the most modern social engineering attack techniques. Real world attacks will be illustrated by exploiting the potential of social networks such as Facebook, Spokeo or Twitter. Almost one hour of video lessons will teach you everything you need to know to master the most important tool in the field: Social Engineering Toolkit.   


Module 9: Attacking Wi-Fi Network

The following module focuses on the attacks that can be executed on Wi-Fi networks. The student will learn how to attack and access remote Wi-Fi networks, obtain keys, password and much more, according to their configuration and security mechanism. We will first start exploring the attacks against WEP and then focus our tests on more secure networks: WPA, WPA2 and WPS. 


Module 10: Wi-Fi as an attack Vector

In the last module, of the Wi-Fi section, the student will learn how to use Wi-Fi as an attack vector. This means that we will not attack Wi-Fi networks, instead we will use Wi-Fi in order to create fake networks, obtain credentials, run MitM attacks and much more.   




3 Months




# 7,000 Taka for Bangladeshi Students

# $100 USD for International Students

Contact us:

Need Technical Assistance? Speak with a support representative by Mailing -