Penetration Testing Crash Course
4 sections
5 challenges
Want to know what it’s like to hack into computers?
In this crash course, we’ll take you from 0 to exploiting a machine in about 20 minutes! (It’s free for subscribers and course buyers!) We’ll guide you from discovery, enumeration, to exploitation.
Ready to start?
Ready to start?
Real software vulns
Gain root privileges via an FTP vuln
What’s inside?
Introduction
Learn the terms and methodology you need to perform an attack.
Scanning the target!
Learn about scanning machines and your future best friend
nmap
.
Enumeration
How do we use what we learned about our target to discover and determine potential weaknesses?
Exploitation
With the enumeration work done, you’re ready to attack our target!
Why we’re worth it

Nina, co-founder
Before you start
- You’ll need a general tech background, meaning a little scripting/programming experience, a general understanding of the web, and so on.
This course is for you if...
- You are new to cybersecurity and not sure where to start.
- You prefer to learn cybersecurity with hands-on labs rather than just reading or watching videos.
As a starter course, you’ll get the big picture of what hacking can look like. If you want to learn cybersecurity in greater depth, check out our other courses (more courses coming!).
FAQs.
Kali machineWhat are the specs for my Kali Linux virtual machine?
Internet is disabled, CPU is limited to 1.5 units and RAM is limited to 2G. But other than that, you have access to your machine 24/7.
Will my data (my files, scripts etc) be persisted in my Kali machine?
Store all your scripts & data in ~/nest
as this folder (and nothing else!) will be persisted across restarts & updates.
All your servers are too far from me and my machine is laggy. Can you set one up near me?
Of course! Let us know where you’d like your lab to be hosted and we’d happily create a new server near it.
We’re also already working on making servers in the US available.
How long do I get access to the machine?
Subscribers get access for as long as you’re subscribed. If you’ve purchased a course, then you always have access to it.
Can I request additional tools on my machine?
Of course you can! Please contact us with your requests (see our help centre when logged in).
Are there any minimum requirements to run this?
Since there’s an entire machine in our app, make sure your screen is big enough (1920x1680)!
Can I change the location of my machine & labs any time?
Send us your request via the help center when logged in. This will be automated soon!
What’s the refund policy?
We give refunds if requested within 1 month (i.e. for the current month of subscription, or courses purchased less than a month ago).
Are there prerequisites to your courses?
As long as you have a general tech background (programmer, IT, computer science student etc), we don’t assume any prior cybersecurity knowledge!
Why do you require a general tech background for your courses?
Being able to break / exploit something comes from knowing it as well as you know your palm. We leave the prerequisite tech background to other people’s capable hands, so that we can focus on teaching you how to break the tech.