The Basic Computer Network Exploitation course introduces foundational offensive security concepts and techniques through hands-on exploitation of Windows and Linux systems in controlled environments. Students learn how attackers perform reconnaissance, gain initial access, escalate privileges, maintain persistence, and move within a network. The course emphasizes command-line proficiency, structured tradecraft, and repeatable workflows rather than advanced exploitation or custom tooling. Students conclude with a Culmination Exercise (CULEX) that requires executing a basic end-to-end exploitation workflow across multiple hosts.
Intended Audience: Individuals new to offensive security, junior cyber operators, and security practitioners seeking foundational hands-on experience with exploitation techniques. Students should have basic familiarity with computer systems but do not need prior penetration testing or red team experience.