INE - OSCP Security Technology Prep Course Free Download

INE - OSCP Security Technology Prep Course Free Download

INE - OSCP Security Technology Prep Course Free Download

INE - OSCP Security Technology Course

Course Description

OSCP (Offensive Security Certified Professional) is an ethical hacking certification offered by Offensive Security that teaches penetration testing and therefore the use of the tools included with the Kali Linux distribution.

This course provides a foundation in advanced penetration testing which can prepare students for the Penetration Testing with Kali Linux (PWK) course offered by Offensive Security. The course also will prepare students for the Offensive Security Certified Professional (OSCP) exam, which usually proceeds the PWK course. Students should be conversant in Linux command, common networking terminology, and basic Bash/Python scripting before attempting this course.

Course Content

1. Overview
  • Course Introduction
2. Introduction To Kali Linux
  • Installing Kali Linux
  • Command Line Refresher
  • Kali Linux Services
  • Bash Scripting in Kali Linux
3. Information Gathering
  • Information Gathering
4. Scanning
  • TCP vs UDP
  • Scanning with Nmap
  • Scanning with Nessus
  • Scanning with Metasploit
5. Enumeration
  • Installing Kioptrix: Level 1
  • SSH Enumeration
  • HTTP Enumeration
  • SMB Enumeration
  • DNS Enumeration
  • Other Enumeration
6. Netcat
  • Introduction to Netcat
7. Buffer Overflows
  • Introduction to Buffer Overflows
  • Fuzzing
  • Finding the Offset
  • Overwriting the EIP
  • Finding Bad Characters
  • Finding the Right Module
  • Generating Shellcode & Gaining Root
8. Exploitation
  • Gaining Root with Metasploit
  • Compiling an Exploit
  • Modifying Shellcode
  • Client-Side Attacks
  • Java Applet Attacks
  • Antivirus Bypassing
  • Pre-Exploit Password Attacks
9. WebApp Exploitation
  • Installing XSS & MySQL FILE
  • Cross-Site Scripting (XSS)
  • SQL Injection (SQLi)
  • Local File Inclusion (LFI)
  • Remote File Inclusion (RFI)
10. File Transfers
  • Introduction to File Transfers
11. Privilege Escalation
  • Introduction to Privilege Escalation
12. Post Exploitation
  • Linux Post Exploitation
  • Windows Post Exploitation
  • Post-Exploit Password Attacks
  • Pivoting
13. Capstone
  • Kioptrix Level 1.1 Walkthrough
  • BTRSys 2.1 Walkthrough
  • DroopyCTF Walkthrough
  • SickOS 1.2 Walkthrough
14. Summary
  • Course Conclusion

➤ Join My Telegram Channel For Daily Updates -: Click Here

Search References
INE - OSCP Security Technology Course Free Download
cybersecurity Course Free Download
Dedsec All Course Free Download
Learn CyberSecurity in Hindi
OSCP Course Free Download
CISSP Course Free Download
CEH Complete Course
Techchip All Paid Videos Free Download
Technical Sagar All Course Free Download
OSCP Security Technology Course Free Download
Offensive Security Certified Professional Course
OSCP Security Technology Prep Course Free Download

Post a Comment