It depends on the profile that you would like to develop. Some advanced techniques can be developed, such as reversing, binary fuzzing or so on. However, the cost of any hardware or professional software is not included (take into account that if your are looking to learn enterprise tools, they may be too advanced and expensive).
This course would include a short introduction to CTF contests and how to get into them with some success. But it can be replaced with some "differentiating techniques" that will provide you work for the rest of your life.
I can offer the following course over Skype and a schedule to explain these tools over a remote session.
Methodologies
1.1 Common methodologies
1.2 Web audit stages
2. Basic information gathering
2.1 DNS Discovery
2.2 Service identification
2.3 Directory Listing
2.4 Identifying safeguards
2.5 Identification of CMS
2.6 Passive collection
3. Advanced information gathering
3.1 NMAP analysis
3.2 Analysis using NESSUS
3.3 Analysis using Acunetix
3.4 Analysis using Nikto
3.5 SSL Analysis
4. Web vulnerabilities
3.1 Cross Scripting (XSS)
3.2 Stored XSS with Burp
3.3 SQL Injection
3.4 SQL Injection with Burp
3.5 Bruteforce with Burp
3.6 Session manipulation with Burp
3.7 CSRF attack with Burp
3.8 Decoding with Burp
5. Advanced techniques
5.1 Intercepting traffic with SSLStrip
5.2 Scapy
5.1 Fuzzing