πŸŽ“Learn more... Get eCPPTv2

All documentation you need to pass eCPPTv2 with free training.

Learn Linux

Learn Windows

Learn Networking

The 6-stage penetration testing process

  1. Information gathering (enumeration)

  2. Vulnerability assessment

  3. Exploitation

  4. Post-exploitation

  5. Lateral movement

  6. Proof of concept

Sign up to our mailing list to receive updates!
By clicking Subscribe, you agree to the processing of your email address in accordance with our privacy policy.

Last updated