Post

Penetration Testing Lab – Executive Master in Cybersecurity (IUSI)

Penetration Testing Lab – Executive Master in Cybersecurity (IUSI)

As part of the Executive Master in Cybersecurity offered by IUSI – Istituto Universitario di Scienze Informatiche, I was entrusted with delivering the practical laboratory module on penetration testing.

Course Context

The executive master aims to train high-level cybersecurity professionals by combining theoretical knowledge with hands-on technical training. My contribution focused on enabling participants to gain operational skills through practical sessions on real-world vulnerable systems.

Module Description: Penetration Testing Lab

The lab was designed to simulate real attack scenarios, allowing students to:

  • Identify and exploit vulnerabilities in isolated environments
  • Understand and apply the phases of a penetration test
  • Document technical findings effectively

Topics Covered:

  • Methodologies: PTES, OSSTMM, and OWASP Testing Guide
  • Reconnaissance and enumeration techniques
  • Exploitation of known CVEs
  • Privilege escalation on Windows and Linux
  • Post-exploitation and lateral movement
  • Writing a professional pentest report

Tools and Platforms

During the sessions, the following platforms and tools were used:

  • Kali Linux, Parrot OS, and Metasploit Framework
  • Burp Suite, Nmap, Enum4linux, Impacket
  • Hack The Box-like custom vulnerable machines

Goals and Outcomes

By the end of the lab, participants were able to:

  • Conduct structured penetration tests on target systems
  • Analyze and exploit common vulnerabilities (e.g., misconfigurations, outdated software, weak credentials)
  • Demonstrate attack paths from external recon to system compromise

About the Executive Master

The IUSI Executive Master in Cybersecurity targets IT professionals, auditors, risk managers, and law enforcement. It blends managerial and technical aspects of cyber defense with a strong focus on operational resilience.

More info 👉 iusi.eu/corsi/executive-master-sicurezza-informatica


Delivering this module was a rewarding opportunity to translate real-world offensive security practices into structured and ethical learning for future cybersecurity leaders.

This post is licensed under CC BY 4.0 by the author.