340–395 hours of structured, practical cybersecurity education. From Linux CLI fundamentals to real penetration testing engagements — and the certifications to prove it.
What You'll Learn
Certification Alignment
This learning path is mapped to the following certifications. Completing the course prepares you to sit for each exam.
Curriculum — 9 Stages
Complete each stage in order. Commit and push your work before advancing.
-
01▾Linux Foundations & CLI MasteryThe command line is your weapon — learn to wield it
Start from zero and build genuine CLI fluency. Everything in penetration testing happens at the command line — this stage ensures you're not guessing. Learn the filesystem, permissions, piping, scripting, and more.
Filesystem navigation File permissions Users & groups Text processing Bash scripting Process management Package management -
02▾Linux System AdministrationServices, storage, networking config, and hardening
A penetration tester who understands system administration finds vulnerabilities that others miss. Learn how Linux servers are built and configured — so you know exactly how to break them.
systemd & services Network configuration SSH setup & hardening Disk & storage Log management Cron & scheduling Security baseline -
03▾Networking FundamentalsProtocols, packet analysis, and network architecture
You can't hack what you don't understand. Build deep networking knowledge covering OSI, TCP/IP, common protocols, routing, and how to read network traffic — essential for every stage that follows.
OSI & TCP/IP models IP addressing & CIDR TCP/UDP/ICMP DNS, HTTP, FTP, SMB Wireshark tcpdump Routing & switching -
04▾Kali Linux Setup & MethodologyYour attacker OS, toolkit, and professional mindset
Install and master Kali Linux. Learn the penetration testing methodology (PTES, OWASP, NIST), set up your lab environment, understand legal and ethical frameworks, and build your documentation habits from day one.
Kali installation & config VM lab setup Penetration testing phases Legal & ethical framework Rules of engagement Documentation standards Tool overview -
05▾Reconnaissance & Information GatheringOSINT, passive and active recon techniques
Real engagements start long before you touch a target system. Master passive OSINT, DNS enumeration, subdomain discovery, social engineering recon, and the tools that professional penetration testers use every day.
OSINT techniques Passive vs active recon DNS enumeration Shodan & Censys theHarvester Maltego basics Subdomain enumeration -
06▾Vulnerability Scanning & AnalysisNmap, Nessus, OpenVAS, and reading scan results
Know what you're attacking before you attack it. Learn port scanning, service fingerprinting, automated vulnerability discovery, and how to triage, prioritize, and document findings professionally.
Nmap scan types Service fingerprinting Nessus OpenVAS Nikto CVE research Risk prioritization -
07▾Exploitation FundamentalsMetasploit, manual exploitation, and shells
The stage everyone wants to reach. Learn the Metasploit Framework end to end, manual exploitation techniques, payload generation with msfvenom, and how to safely achieve initial access in a lab environment.
Metasploit Framework Auxiliary & exploit modules Payload types msfvenom Reverse & bind shells Manual exploitation Exploit-DB -
08▾Post-Exploitation & Privilege EscalationPersistence, pivoting, and escalating access
Getting in is just the beginning. Learn what happens after initial access — privilege escalation on Linux and Windows, lateral movement, credential harvesting, and covering your tracks in an authorized engagement.
Linux privesc Windows privesc Meterpreter Credential harvesting Lateral movement Persistence techniques Pivoting & tunneling -
09▾Reporting & Professional PracticeWrite real pentest reports and land your first job
The most underrated skill in security. Learn to write executive summaries, technical findings, and risk recommendations that clients and employers actually value. Includes career development, resume building, and interview preparation.
Report structure Executive summaries Technical findings Risk scoring (CVSS) Remediation guidance Portfolio building Job market prep
Who This Course Is For
Prerequisites
- ✓ Basic computer literacy (browsing, installing software)
- ✓ A machine capable of running virtual machines (8GB+ RAM recommended)
- ✓ Patience — this is a deep course. It's meant to be thorough, not fast.
- ✗ No prior Linux or security experience required — Stage 1 starts from zero
Start your penetration testing career.
Founding Members get full access to this course plus everything TechNodeX builds. Lock in $9/month forever.
Become a Founding Member — $9/mo →Price locked forever. Cancel anytime. Secure checkout by Lemon Squeezy.