Cohort Zero — Core Offensive Foundations
A twelve-week opener that pairs live instruction with guided labs so you can chain reconnaissance, safe exploitation, and evidence capture without losing narrative clarity.
Cohort Zero is built for technologists who already understand networks and Linux but have not yet shipped a full assessment narrative. You will rotate through paired exercises that mirror operator cadence: scope confirmation, controlled testing windows, artifact hygiene, and mentor review of your write-ups. The arc stresses repeatable checklists rather than one-off tricks, and every module ends with a short quality standards checkpoint so you can explain tradeoffs to hiring managers in plain language.
What is inside
- Weekly live lab blocks with mentor presence and live Q&A
- Structured reporting templates tuned for enterprise clients
- Scenario packs that vary difficulty while keeping scope explicit
- Portfolio-ready redacted samples with rubric feedback
- Office hours for toolchain setup on KR-friendly schedules
- Peer review circles that mirror async review in real teams
- Capstone rehearsal with time-boxed presentation and critique
Outcomes
- Produce a defensible testing timeline for a fictional scope
- Deliver a two-page findings brief with clear severity rationale
- Demonstrate safe handling of credentials and session artifacts
Lead mentor
Haneul Park
Lead penetration testing instructor with a decade of operator rotations across enterprise markets.
Tuition indicator: ₩3,200,000 · See Cancellation Policy before paying tuition.
Questions
Participant notes
Week five’s reporting lab finally made severity labels feel intentional. I still reuse the table layout in Cohort Zero when I draft internal notes.
The capstone critique was blunt in a useful way. I would have liked one more buffer day before the final rehearsal, yet the mentor notes on evidence ordering were the standout.