inflearn logo
inflearn logo

Penetration Testing Lecture 2 (Practice Environment 2 provided)

With hacking incidents occurring continuously from 2025 to the present, the addition of penetration testing to ISMS-P certification has been finalized. As the work-life balance and importance of penetration testers rise, there is a need for an environment where they can grow. Unlike other fields of information security, penetration testers can only practice and build portfolios when a proper environment is provided. Unlike the first penetration testing environment which simply provided a practice lab, this second environment allows you to build the website yourself, complete with more diverse admin functions and even actual payment features! Penetration testing scenarios for achieving practical goals have been fully implemented! ~Hone your skills according to the 2026 Major Information and Communication Infrastructure penetration testing items and evolve into one of the top penetration testers in the country!~

2 learners are taking this course

Level Intermediate

Course period 6 months

ISMS-P
ISMS-P
CPPG
CPPG
Engineer information security
Engineer information security
security training
security training
Industrial Security Exper
Industrial Security Exper
ISMS-P
ISMS-P
CPPG
CPPG
Engineer information security
Engineer information security
security training
security training
Industrial Security Exper
Industrial Security Exper
날개 달린 동전

Recommend Course to grow and earn commission!

날개 달린 동전

Marketing Partners

Recommend Course to grow and earn commission!

What you will gain after the course

  • Securing a penetration testing practice site

  • Acquiring penetration testing results and learning how to build penetration testing sites

🔐 Practical Penetration Testing Master Class (No Audio)

“Practical penetration testing learned in a real hacking environment, not just theory”


🚀 Course Introduction

This course is not just a simple lecture on vulnerability theory.
It is a practical penetration testing training course where you experience the actual security work process—from
👉 installation → analysis → attack → inspection → report review
—targeting a system identical to a real service structure within a self-built dedicated penetration testing website environment.

Through the provided exclusive installation file, students will directly build a penetration testing site based on an actual service structure that includes:
✔️ Payment functions
✔️ Admin page
✔️ Member management system
✔️ Database structure
✔️ Environments with partial secure coding applied


🧩 Core Course Components

🏗️ Building a Real-World Environment

  • 🔧 Provision of an automatic installation file for a dedicated mock hacking website

  • 🗄️ Includes DB structure + admin system

  • 💳 Implementation of actual payment process structure

  • 🧑‍💼 Implementation of administrator page authority structure

  • 🔐 Configuration of environments with partial secure coding applied

👉 Not just a “practice demo site”
👉 A penetration testing environment with the same structure as an actual service


🧑‍💻 Individual Practice-Oriented Progression

  • 👤 Establishment of independent environments for each participant

  • 🎯 Designing individual attack scenarios manually

  • 🧪 Combination of automated tools + manual analysis

  • 🛠️ Learning based on attack technique practice

👉 Not just hacking demonstrated by the instructor
👉 A structure where students perform the hacking themselves


📜 Reflecting 2026 Practical Standard Guidelines

  • 📘 Designed with reference to the 2026 Critical Information and Communication Infrastructure Penetration Testing Standards

  • 📋 Reflecting the actual inspection process structure

  • 🧾 Scenario configuration based on practical inspection methods

  • 🏛️ Same inspection structure applied as public institutions/corporations

👉 A combined structure of practical standards + educational environment


🎯 Key Curriculum Points

🧠 Vulnerability Analysis

  • 🔍 Input Validation Vulnerabilities

  • 🔓 Authentication/Authorization Structure Vulnerabilities

  • 🗃️ DB Integration Structure Analysis

  • 🧬 Session Structure Analysis

  • 🔐 Encryption/Security Logic Analysis


💳 Practical Function-Based Penetration Testing

  • 💰 Attempting to change payment amount

  • 🧾 Forgery and Alteration of Payment Parameters

  • 🛒 Payment Logic Bypass Attack

  • 🧑‍💼 Privilege Escalation Attack to Admin Rights

  • 🧑‍💻 User Privilege Escalation Scenario

👉 Not just simple vulnerability attacks, but
👉 A structure centered on “Service Function-Based Hacking”


📊 Final Course Structure

🔥 Final Practical Project

  • 💳 Payment Amount Manipulation Scenario

  • 🧑‍💼 Admin Function Compromise Scenario

  • 🧾 Data Manipulation Scenarios

  • 🧠 Designing Attack Logic Structures

  • 📋 Creating a Checklist (Inspection Standard Table)

  • 📑 Review of the Final Report

  • 🎯 Attack Success/Failure Analysis

  • 📈 Designing Security Improvement Directions

👉 Review based on the structure of actual corporate penetration testing result reports


💡 Why this course is special

✅ Practice-oriented structure
✅ Environment based on real-world service architecture
✅ Criteria-based inspection system
✅ Learning inspection frameworks, not just simple practice
✅ Practical structure designed for real-world application, not just education
✅ Combined automated and manual analysis
✅ Full-process training including result reviews


🎓 Recommended for the following people

👨‍💻 Developers who want to grow into security practitioners
🛡️ Information security beginners
🧑‍💼 Job seekers for security roles
🏢 Corporate security managers
📚 Learners who want practical-oriented education
🔍 Those who want to learn penetration testing structurally


✨ One-line Summary

“This is not a lecture on how to use tools, but a course where you
understand the actual hacking structure and execute real-world inspection processes.

Recommended for
these people

Who is this course right for?

  • Information security beginners, including penetration testers

  • Experienced professional with penetration testing experience

Need to know before starting?

  • Attended the first lecture on penetration testing

  • Attended the first lecture on penetration testing

Hello
This is jueygrace

189

Learners

13

Reviews

4.2

Rating

26

Courses

Security Consulting

Curriculum

All

4 lectures ∙ (7min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

Not enough reviews.
Please write a valuable review that helps everyone!

jueygrace's other courses

Check out other courses by the instructor!

Similar courses

Explore other courses in the same field!

Limited time deal

$13.20

25%

$17.60