Network Security

OSCP Security Technology Prep Course

Heath Adams
Heath Adams
OSCP, CEH, CCNA R&S, Linux+/LPIC-1, Security+, Network+, A+

This course is included in our All Access Pass! Get unlimited streaming access to 12,000+ videos, workbooks, and practice exams by starting your free trial of the All Access Pass subscription!
Start Your FREE Trial!


Course Description
This course provides a foundation in advanced penetration testing that will prepare students for the Penetration Testing with Kali Linux (PWK) course offered by Offensive Security. The course will also prepare students for the Offensive Security Certified Professional (OSCP) exam, which typically proceeds the PWK course. Students should be familiar with Linux command line, common networking terminology, and basic Bash/Python scripting prior to attempting this course.
  • Course
    • Overview
      • Course Introduction
    • Introduction to Kali Linux
      • Installing Kali Linux
      • Command Line Refresher
      • Kali Linux Services
      • Bash Scripting in Kali Linux
    • Information Gathering
      • Information Gathering
    • Scanning
      • TCP vs UDP
      • Scanning with Nmap
      • Scanning with Nessus
      • Scanning with Metasploit
    • Enumeration
      • Installing Kioptrix: Level 1
      • SSH Enumeration
      • HTTP Enumeration
      • SMB Enumeration
      • DNS Enumeration
      • Other Enumeration
    • Netcat
      • Introduction to Netcat
    • Buffer Overflows
      • Introduction to Buffer Overflows
      • Fuzzing
      • Finding the Offset
      • Overwriting the EIP
      • Finding Bad Characters
      • Finding the Right Module
      • Generating Shellcode & Gaining Root
    • Exploitation
      • Gaining Root with Metasploit
      • Compiling an Exploit
      • Modifying Shellcode
      • Client Side Attacks
      • Java Applet Attacks
      • Antivirus Bypassing
      • Pre-Exploit Password Attacks
    • WebApp Exploitation
      • Installing XSS & MySQL FILE
      • Cross-Site Scripting (XSS)
      • SQL Injection (SQLi)
      • Local File Inclusion (LFI)
      • Remote File Inclusion (RFI)
    • File Transfers
      • Introduction to File Transfers
    • Privilege Escalation
      • Introduction to Privilege Escalation
    • Post Exploitation
      • Linux Post Exploitation
      • Windows Post Exploitation
      • Post-Exploit Password Attacks
      • Pivoting
    • Capstone
      • Kioptrix Level 1.1 Walkthrough
      • BTRSys 2.1 Walkthrough
      • DroopyCTF Walkthrough
      • SickOS 1.2 Walkthrough
    • Summary
      • Course Conclusion

 

Course Outline:
  • Course
    • Overview
      • Course Introduction
    • Introduction to Kali Linux
      • Installing Kali Linux
      • Command Line Refresher
      • Kali Linux Services
      • Bash Scripting in Kali Linux
    • Information Gathering
      • Information Gathering
    • Scanning
      • TCP vs UDP
      • Scanning with Nmap
      • Scanning with Nessus
      • Scanning with Metasploit
    • Enumeration
      • Installing Kioptrix: Level 1
      • SSH Enumeration
      • HTTP Enumeration
      • SMB Enumeration
      • DNS Enumeration
      • Other Enumeration
    • Netcat
      • Introduction to Netcat
    • Buffer Overflows
      • Introduction to Buffer Overflows
      • Fuzzing
      • Finding the Offset
      • Overwriting the EIP
      • Finding Bad Characters
      • Finding the Right Module
      • Generating Shellcode & Gaining Root
    • Exploitation
      • Gaining Root with Metasploit
      • Compiling an Exploit
      • Modifying Shellcode
      • Client Side Attacks
      • Java Applet Attacks
      • Antivirus Bypassing
      • Pre-Exploit Password Attacks
    • WebApp Exploitation
      • Installing XSS & MySQL FILE
      • Cross-Site Scripting (XSS)
      • SQL Injection (SQLi)
      • Local File Inclusion (LFI)
      • Remote File Inclusion (RFI)
    • File Transfers
      • Introduction to File Transfers
    • Privilege Escalation
      • Introduction to Privilege Escalation
    • Post Exploitation
      • Linux Post Exploitation
      • Windows Post Exploitation
      • Post-Exploit Password Attacks
      • Pivoting
    • Capstone
      • Kioptrix Level 1.1 Walkthrough
      • BTRSys 2.1 Walkthrough
      • DroopyCTF Walkthrough
      • SickOS 1.2 Walkthrough
    • Summary
      • Course Conclusion

If you would like more information on how to purchase this course individually, contact a Training Specialist.