OSCP Certification Training
Sun, 21 Apr
|https://discord.gg/ZFBjXPegWA
Kick start your Certifications Training with us. It is important to understand application of various security certification and which fits best for your career. If you find OSCP certification as the fitting next step, join our affordable training programs. **Special discount for Students**
Time & Location
21 Apr 2024, 10:00 am – 21 May 2024, 10:00 am
https://discord.gg/ZFBjXPegWA
About the event
Course Overview
Our Training program will follow the sequence of OSCP Certification Syllabus. However, practice lab for each section will be covering more than the labs offered in the syllabus so that you get comprehensive knowledge and hands-on variety of labs.
Trainer: Swati Laxmi
There will be 1 Assisting trainer (Industry expert with OSCP)
Module 01: Introduction to Penetration Testing
1.1 Understanding the Role of Penetration Testing in Cybersecurity
1.2 Methodologies and Frameworks in Penetration Testing
LAB01
Module 02: Operating System Proficiency with Kali Linux
2.1 Navigating Kali Linux Environment
2.2 Utilizing Kali Linux Tools for Security Testing
LAB02
Module 03: Mastering Command Line Operations
3.1 Command Line Essentials for Penetration Testing
3.2 Advanced Command Line Techniques
LAB03
Module 04: Essential Tools for Penetration Testing
4.1 Selection Criteria for Penetration Testing Tools
4.2 Practical Applications of Penetration Testing Tools
LAB04
Module 05: Bash Scripting for Automation
5.1 Introduction to Bash Scripting
5.2 Automating Penetration Testing Tasks with Bash
LAB05
Module 06: Passive Information Gathering Techniques
6.1 Understanding Passive Information Gathering
6.2 Tools and Techniques for Passive Reconnaissance
LAB06
Module 07: Active Information Gathering Techniques
7.1 Conducting Active Reconnaissance Safely
7.2 Leveraging Active Information Gathering Tools
LAB07
Module 08: Vulnerability Scanning
8.1 Fundamentals of Vulnerability Scanning
8.2 Performing Vulnerability Assessments with Tools
LAB08
Module 09: Web Application Attacks
9.1 Understanding Web Application Vulnerabilities
9.2 Exploiting Web Applications for Penetration Testing
LAB09
Module 10: Introduction to Buffer Overflows
10.1 Understanding Buffer Overflows
10.2 Identifying and Exploiting Buffer Overflow Vulnerabilities
LAB10
Module 11: Windows Buffer Overflows
11.1 Windows-Specific Buffer Overflow Techniques
11.2 Exploiting Buffer Overflows in Windows Systems
LAB11
Module 12: Linux Buffer Overflows
12.1 Linux-Specific Buffer Overflow Techniques
12.2 Exploiting Buffer Overflows in Linux Systems
LAB12
Module 13: Client-Side Attacks
13.1 Techniques for Client-Side Exploitation
13.2 Exploiting Client Applications for Penetration Testing
LAB13
Module 14: Exploit Discovery and Utilization
14.1 Locating and Analyzing Public Exploits
14.2 Customizing and Deploying Exploits
LAB14
Module 15: Exploit Remediation
15.1 Understanding Patch Management
15.2 Mitigating Exploits in Vulnerable Systems
LAB15
Module 16: File Transfers in Penetration Testing
16.1 Secure File Transfer Techniques
16.2 Exfiltrating Data During Penetration Testing
LAB16
Module 17: Antivirus Evasion Techniques
17.1 Evading Antivirus Detection
17.2 Leveraging Antivirus Evasion Tools
LAB17
Module 18: Privilege Escalation
18.1 Understanding Privilege Escalation Paths
18.2 Exploiting Privilege Escalation Vulnerabilities
LAB18
Module 19: Password Attacks
19.1 Techniques for Password Cracking
19.2 Password Attack Strategies in Penetration Testing
LAB19
Module 20: Port Redirection and Tunneling
20.1 Port Redirection Fundamentals
20.2 Utilizing Port Redirection for Penetration Testing
LAB20
Module 21: Active Directory Attacks
21.1 Understanding Active Directory Vulnerabilities
21.2 Exploiting Active Directory for Penetration Testing
LAB21
Module 22: Utilizing the Metasploit Framework
22.1 Introduction to Metasploit Framework
22.2 Leveraging Metasploit for Exploitation
LAB22
Module 23: PowerShell Empire
23.1 Exploring PowerShell Empire Capabilities
23.2 Harnessing PowerShell Empire in Penetration Testing
LAB23
Module 24: Penetration Test Breakdown
24.1 Understanding the Penetration Testing Process
24.2 Analyzing and Reporting Penetration Test Results
LAB24
Module 25: Advanced Penetration Testing Labs
25.1 Hands-on Challenges for Penetration Testing Skills Enhancement
25.2 Real-World Scenario Simulations for Advanced Practitioners
Course Duration (total 120 hours)
Saturday/Sunday 11 AM - 3 PM
Saturday/Sunday 7 PM - 11 PM
OR
Weekdays - 9 PM - 11 PM
Resources
We will be using different resources and techniques to get the complete attacking and defending AD like HTB rooms, Simulated lab by Defhawk, Try hack me rooms and labs from Altered Security / pentester academy to get both theoretical and practical hands on experience etc.
Training Completion Certificate Attendees will also get a course completion certificate after completing Learning Objectives covered during the course.