강의

멘토링

커뮤니티

NEW
Security & Network

/

Computer Security

Penetration Testing Project Practice Course (Portfolio)

Most large corporations and financial institutions are conducting penetration testing in addition to simulated hacking, so recently there is a need to establish new positions and secure capabilities to perform penetration operations using the RED TEAM terminology as is. Therefore, in addition to simple WEB and APP simulated hacking, we are opening an educational course that can provide practical training on large-scale personal information leakage after discovering scenarios that can penetrate servers. +Providing server and website environments where penetration testing can be performed +Sharing hacking tools and hacking methods

2 learners are taking this course

  • jueygrace
실습 중심
자격증
시험
토이프로젝트
협업말센스
ISMS-P
CPPG
security training
Engineer information security
Industrial Security Exper

What you will gain after the course

  • Understanding of Penetration Testing and 100% Acquisition of Execution Capability

  • Ability to establish penetration testing scenarios and secure hacking tool utilization capabilities

🔥 Penetration Testing (RED TEAM) & PenTest Practice Online Classes

― A 'completely hands-on' attack and defense training program where you actually attack real servers, design scenarios, and perform breach result reporting!

Today's security environment goes beyond simple vulnerability assessments,
"What paths can attackers actually use to infiltrate",
**"How well can security organizations detect and respond to them"** - verifying these through RED TEAM penetration testing methods has become essential.

This online course is not just about watching lecture screens.
It provides students with actual attackable servers, websites, and network environments,
allowing them to perform the entire process like a real attacker:
reconnaissance → vulnerability discovery → penetration → privilege escalation → lateral movement → data exfiltration → report writing.
This is a top-tier, hands-on training program in Korea designed for practical experience.


🚀 Key Features of the Course

🧩 1. Provides an Actually Attackable Server and Web Environment

  • 🌐 Provides 'actually hackable' environments including web services, API servers, and internal systems

  • 🖥️ Practical-Based Configuration Including Vulnerable OS, WAS, and DB

  • 🔌 Network segment separation and lateral movement practice available

  • 🏗️ You can review with the test environment as is

🎯 2. RED TEAM Attack Scenario-Based Practice

  • 🛰️ Initial Access Scenario Design

  • 🌩️ OSINT-Based Information Gathering and Attack Point Discovery

  • 🔥 Parameter Manipulation, Vulnerable Feature Exploitation, and Bypass Technique Practice

  • 🧨 Vulnerable Web Page → Internal Server Penetration Process Reproduction

  • 🪜 Performing Privilege Escalation Scenarios Hands-On

  • 🚪 Authentication Bypass, Session Hijacking, and RCE-based Internal Portal Access Practice

  • ⚙️ Systematic Step-by-Step Learning of Internal Network Lateral Movement

🗃️ 3. Practice Scenario: Mass Leakage of Personal and Critical Information

  • 🗄️ Extracting Personal Information and Account Information from DB

  • 📂 Scenario for Accessing Critical Information from File Servers and Storage

  • 🤖 Building Automated Collection Scripts

  • 📉 Experience the actual information leakage process that occurs in real companies

  • 💣 Analysis of How Attackers Erase Their Traces After Information Leakage


📘 Main Curriculum Structure

🔎 1. Reconnaissance & Information Gathering

  • 🌍 Domain & Subdomain Scanning

  • 🔗 Corporate OSINT Collection (Email Patterns, System Architecture, etc.)

  • 📡 Service Discovery & Port Scanning (Nmap Practice)

💣 2. Vulnerability Analysis & Attack

  • ⚒️ Vulnerable Web Function Attacks (SQLi, XSS, File Upload, etc.)

  • 🧮 Exploiting Server Vulnerable Versions and Executing Exploits

  • 🛠️ Hands-on Practice with Major Tools: Metasploit, BurpSuite, nuclei, and More

  • 🪤 Bypassing Internal Authentication System and Privilege Escalation

🧬 3. Internal Network Infiltration & Information Theft

  • 🪜 Privilege Escalation Technique Practice

  • 🔄 SSH Tunnel·Port Forwarding Practice

  • 🗂️ Access to Critical Assets such as Internal DB and File Servers

  • ⚡ Bulk Data Collection and Extraction Scenarios

📝 4. Report Writing & Establishing Improvement Plans

  • 📑 Penetration Testing Report Template Provided

  • 🧾 Attack Path Reproduction and Evidence Capture Guide

  • 🔐 Technical and Administrative Improvement Measures Writing Practice

  • 🛡️ Establishing Practical Security Plans That Companies Can Actually Implement


🧠 Practical know-how centered on real-world experience

  • ✔ Techniques for detecting vulnerabilities that automated scanners cannot catch

  • ✔ Attack and bypass techniques actually used by real-world RED TEAMS

  • ✔ Log-Based Detection Evasion Methods and Detection Enhancement Points

  • ✔ Tips for Writing Documents to Improve the Quality of Actual Penetration Testing Reports


🎯 This course is most suitable for these people!

  • A security officer who wants to assess the company's security level from an actual attack perspective

  • RED TEAM·Practitioners performing or preparing for penetration testing work

  • PenTest engineers who want to go beyond the basics and experience 'complete real-world penetration scenarios'

  • Web and server developers who want to deeply understand vulnerabilities from a security perspective

  • For anyone who wants to improve their security consulting report writing skills


🎓 Expected Outcomes After Taking the Course

  • ✔ Acquire practical RED TEAM capabilities in an environment where real attacks are possible

  • ✔ Master the complete process: Infiltration → Privilege Escalation → Lateral Movement → Data Exfiltration

  • ✔ Strengthening practical skills in using major hacking tools

  • ✔ Acquired ability to write penetration testing reports and establish improvement plans

  • ✔ Acquire expert-level capabilities to diagnose an organization's actual security level


📢 Register now!

This course is not just about vulnerability assessment,
but a training program that completes 'real practical RED TEAM capabilities' by practicing the entire penetration process from an attacker's perspective.
Experience attacking actual servers and web environments, and go through report writing and improvement measures after information leakage
Meet Korea's top-level online hands-on training now!

Recommended for
these people

Who is this course right for?

  • I've performed penetration testing but have no experience with simulated intrusion

  • When you need to conduct penetration testing but face difficulties in establishing scenarios

Need to know before starting?

  • # Understanding and Experience in WEB Penetration Testing

  • Experience in vulnerability assessment or remediation for web servers in accordance with Critical Information Infrastructure Protection and Electronic Financial Infrastructure regulations

Hello
This is

86

Learners

6

Reviews

4.2

Rating

23

Courses

보안컨설팅

Curriculum

All

3 lectures ∙ (11min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

Not enough reviews.
Please write a valuable review that helps everyone!

Limited time deal

$13.20

25%

$17.60

jueygrace's other courses

Check out other courses by the instructor!

Similar courses

Explore other courses in the same field!