Cyber Security Courses

Penetration Testing Tools Master Course

This Master Course is for those who want to become penetration testers or improve their mastery of penetration testing tools.

Mossé Cyber Security Institute will teach you how to master the most important penetration-testing tools available. Detailed step-by-step instructions are provided for students to learn how to use Metasploit, NMAP, OpenVAS, PowerShell Empire, PoshC2, PowerSploit, Bloodhound, and Burp Suite.

Theoretical knowledge makes up 40% of the course, and 60% is made up of practical exercises. The last day of the course is a practical penetration-testing exercise where students will put the skills they have learnt into practice.


Among the many topics covered are:

  • Discovering and exploit vulnerabilities in network services
  • Generating backdoors that bypass anti-virus software
  • Generating payloads for spear-phishing campaigns
  • Attacking Active Directory and user accounts
  • Finding and exploiting vulnerabilities in web applications and APIs

Course Outcome

The content taught in this course has been extensively tested against hundreds of computer networks and applications and proved highly effective against targets with a low or moderate defence. In other words, unless your target has an endpoint detection and response (EDR) product deployed across their network, a secure standard operating environment (SSOE), and a professional team of security analysts detecting and responding to breaches, your chances of hacking them, completely, will be high!

If you work on the defensive side of security, this course will teach you many of the most common techniques and tools used by penetration testers and offer you tactics and strategies on how you may protect your network against those techniques.

Intended Audience

Aspiring penetration testers and professional penetration testers.


This course is taught by experienced Mossé Security’s instructors. Our instructors have over 10 years of experience delivering penetration testing, red teaming and incident response services for a multitude of industries that have involved complex and multi-faceted approaches. Our instructors each possess the right balance of corporate experience and are competently skilled in presenting and teaching to groups.

Beyond their technical abilities and years of professional experience, our instructors are also trained teachers and public speakers. Their manner of teaching easily conveys their passion for computer security to every one of our students.

Course Outline

Module 1: Professional Penetration Testing

We begin the course by teaching you structured methodologies to deliver penetration testing engagements based on the OWASP Testing Guide, the Penetration Testing Execution Standard (PTES), the PCI Penetration Testing Guide, and the Information Systems Security Assessment Framework (ISSAF).

We will clarify the different types of penetration tests that exist (web application, web services, mobile application, network infrastructure, wireless infrastructure, and other types), and provide practical advice on how one may go about designing, proposing, and obtaining authorization to test and compromise critical IT assets.

Some other important points covered in this module include:

  • How do we professionally setup our testing environment in the cloud?
  • How are we going to demonstrate a return-on-investment (ROI) on the penetration test(s) we’ll run?
  • How are do we identify IT risks that the penetration tests may trigger, and mitigate them ahead of the engagement?
  • What can we do to increase the likelihood of the end-client fixing or mitigating the critical issues we’ll identify?
  • How do we build a team of penetration testers?

They are hundreds, if not thousands, of free penetration testing tools available online. Mossé Security will also clarify why it selected the tools that it did for this Master Course.

Module 2: Metasploit Masterclass

Begin the course by teaching you about the most famous penetration testing framework: Metasploit.

  • Installing, configuring and updating Metasploit
  • Understanding the basic concepts in Metasploit (i.e. exploits, auxiliaries, modules, payloads, listeners, and Meterpreter)
  • Using Metasploit to exploit known vulnerabilities and obtain a reverse-shell
  • Selecting and generating payloads
  • Guessing credentials and attacking user accounts
  • Password dumping, lateral movement, and pivoting into segmented network zones
  • Using Metasploit for Social Engineering attacks
  • Navigating your way around Metasploit’s source code to understand its internal workings

Module 3: NMAP & OpenVAS Masterclass

In this module we teach you everything you need to know to discover and fingerprint network services using NMAP and identify whether they are vulnerable to known vulnerabilities using OpenVAS. Topics covered include:

  • Installing NMAP and OpenVAS
  • Scanning for open ports and fingerprinting network services
  • Generating and parsing NMAP XML outputs
  • All the different types of scans that NMAP can perform, and how and when to use them
  • Scanning for vulnerabilities using OpenVAS
  • Cross-referencing results from OpenVAS and NMAP

Module 4: PowerShell Offensive Tools Masterclass

We teach you top PowerShell tools for penetration testing:

  • PowerShell Empire, an alternative to Meterpreter
  • PoshC2, another alternative to Meterpreter
  • PowerSploit, a post-exploitation framework
  • Bloodhound, a tool for Active Directory reconnaissance and exploitation

Module 5: Burp Suite Masterclass

The final lecture is on Burp Suite – the leading web application penetration testing proxy:

  • Installing and running Burp
  • The differences between the Community and Professional Editions
  • Introduction to the interface, and the different tools available
  • Forwarding traffic through proxies and test machines located in the cloud
  • Mastering the Proxy and Target tools
  • Mastering the Intruder tool
  • Using the Repeater, the Decoder and the Comparer tools
  • Structured penetration testing approaches when using Burp Suite

Module 6: Penetration Test Simulation Exercise

We end the class with a penetration testing simulation against a procedurally generated network in the cloud using Dragon-Net. This simulation is like a capture-the-flag competition, but more realistic. Students will have to compromise machines using the techniques they’ve learnt during the class to win points and try to win our friendly competition!

Enrolment & Fees


  • Ticket: $5,000.00 AUD including GST.

Terms and Conditions

  • Payment is made via Humanitix or by contacting us to receive an invoice.
  • Payment is required at the time of booking.
  • Cancellation notifications within 14 days of the course's start date are not eligible for refund.
  • Cancellations received between 15 and 28 days prior to course commencement will be charged 50% of the course fee.
  • Students are allowed 1 reschedule per class. Transfers received between 15 – 28 days prior to course commencement will be charged a $300 (incl GST) administrative fee. The new session date must be given at the time of the reschedule notification and rescheduled classes must be taken within 6 months of original scheduled date.
  • Transfers received 14 days or less prior to course commencement will be charged 50% of the course fee. The new session date must be given at the time of the reschedule notification and rescheduled classes must be taken within 6 months of original scheduled date.
  • Payment must be made in full prior to any rescheduling.
  • Student substitutions can be made in writing 48 hours prior to a class start.
  • If a student does not attend a scheduled session, there will be no refund or reschedule given. Payment is forfeited. Mossé Security reserves the right to cancel a course and will endeavour to provide participants with as much notice as possible. Upon cancellation, any fees already paid by the participant will be refunded.


Software Requirement

Bring a laptop running the Windows or UNIX operating system with the OpenVPN or Tunnelblick client to connect into our training lab in the cloud.

Career Outcomes

You will learn or refine techniques, tactics and procedures to become a highly proficient penetration tester capable of delivering professional engagements against a variety of targets.

Certification Detail


Notify me when this course is offered next

Visit our Frequently Asked Questions (FAQ) page for answers to the most common questions we receive.