Penetration Testing, often referred to as Ethical Hacking, is one of the most crucial areas of cybersecurity.
This course aims to teach participants how to identify, exploit, and report vulnerabilities within information systems —
using the same tools and techniques as real-world attackers, but within a legal and ethical framework.
Throughout this hands-on training, you will learn how to plan, execute, and document a full-scale penetration test —
from reconnaissance and scanning to exploitation, post-exploitation, and professional reporting.
By the end of this course, participants will have the technical and analytical skills required to conduct penetration tests in real environments, following international standards such as OSSTMM, OWASP, and NIST.


















