Back to Academy

VCA-PEN-101 — Introduction to Penetration Testing

VCA-RE-101 teaches students to characterize a device. VCA-ADV-101 teaches them to test a specific published vulnerability under authorization. VCA-PEN-101 sits between them and broadens the scope: a disciplined introduction to the full engagement lifecycle a professional penetration tester executes when a client gives them scope, a target network, and a week to find whatever is findable.

Duration: 11 weeks
Position: 12th Grade (elective) or Adult/Professional
Prereq: SEC-101 + NET-101 + FND-102
Credential: VCA-PEN-101 Certificate of Completion
Register interest — we’re not taking enrollments yet. Email academy@virtuscybersecurity.com.

Course Overview

The course is deliberately broader than one vulnerability. It is also deliberately narrower than “how to hack everything.” It is how a Virtus Academy graduate would perform their first professionally-scoped engagement against a small business LAN — reconnaissance, enumeration, vulnerability identification, exploitation (within scope), privilege escalation, lateral movement, reporting — and document the work to a standard a paying client would accept.

Learning Outcomes

  1. Scope and contract an authorized engagement — SOW, ROE, change-control process.
  2. Conduct OSINT and passive reconnaissance of a target organization without tripping detection.
  3. Perform active reconnaissance and enumeration (host discovery, port and service enumeration, banner grabbing, OS fingerprinting) using Nmap, Masscan, and purpose-built tooling.
  4. Identify vulnerabilities in common services (SMB, SSH, HTTP, DNS, databases) using Nessus, Nuclei, and manual techniques.
  5. Exploit misconfigurations and commonly-weaponized vulnerabilities using Metasploit, manual exploitation, and scripted tooling — within authorized scope.
  6. Escalate privileges on Linux and Windows targets using published technique families.
  7. Move laterally across an authorized network and reason about scope-limiting rules.
  8. Produce a professional-register engagement report with executive summary, CVSS-scored findings, remediation guidance, and appendices.

Weekly Schedule

WeekTopicLaboratory
1Engagement lifecycle, authorization, ROE, ethicsDraft an ROE for a hypothetical SMB client
2OSINT and passive reconnaissanceOSINT dossier on a lab target
3Active reconnaissance — Nmap, Masscan, service enumerationFull scan and enumeration of the lab network
4Web application recon — directory enumeration, fingerprinting, Burp SuiteEnumerate provided web targets, identify attack surface
5Vulnerability identification — Nessus, Nuclei, manual analysisIdentify and triage vulnerabilities
6Midterm practical — 3-hour scoped mini-engagementProctored exam
7Exploitation I — Metasploit, public exploits, when not to use themExploit Metasploitable, DVWA, HTB retired boxes
8Exploitation II — web-app (SQLi, XSS, SSRF, IDOR, file upload, deserialization)Attacks on Juice Shop / WebGoat
9Post-exploitation — Linux and Windows privilege escalationPrivilege-escalation labs both platforms
10Lateral movement, pivoting, credential reuse; operational securitySimulated multi-host engagement
11Reporting and client communication; ethics of disclosureWrite and present the engagement report

Capstone — Five-Day Simulated Engagement

Students conduct a five-day simulated engagement against an instructor-built target network (three to five hosts with documented intentional vulnerabilities). Deliverables:

  1. Engagement report — executive summary, methodology, findings (CVSS-scored), evidence appendix, remediation roadmap.
  2. Oral debrief — simulated 20-minute client meeting with faculty playing technical and non-technical stakeholders, plus Q&A.

The report register is client-professional, not academic-publication. It is explicitly graded on actionability for the imagined client.

Required Hardware & Software

  • No additional hardware beyond the standard student compute environment (personal laptop or rented Pi).
  • The target network runs in program-owned lab infrastructure (Proxmox or VMware cluster, reset per cohort).
  • Kali Linux in a VM or as the Pi distribution.
  • Tools: Nmap, Masscan, Nessus Essentials, Nuclei, Burp Suite Community, Metasploit, Hashcat, Impacket. All free; Kali bundles most.

Texts: Weidman, Penetration Testing: A Hands-On Introduction to Hacking (No Starch, 2014); Hickey & Arcuri, Hands On Hacking (Wiley, 2020); OWASP Testing Guide v4.2 (free); PTES (free online).

Certification Alignment

CompTIA PenTest+ CompTIA Security+ OSCP Prep

Primary: CompTIA PenTest+ — course content exceeds the exam objectives in every domain. Students should sit PenTest+ within three months of completion. Long-term: OffSec OSCP — this course is explicit preparation for the OSCP skill register.

Interested in VCA-PEN-101?

Email academy@virtuscybersecurity.com with your register and why.

Email academy@virtuscybersecurity.com