Network Security

OSCP Security Technology Course

Heath Adams
Heath Adams
OSCP, CEH, CCNA R&S, Linux+/LPIC-1, Security+, Network+, A+

Course Description
This course provides a foundation in advanced penetration testing that will prepare students for the Penetration Testing with Kali Linux (PWK) course offered by Offensive Security. The course will also prepare students for the Offensive Security Certified Professional (OSCP) exam, which typically proceeds the PWK course. Students should be familiar with Linux command line, common networking terminology, and basic Bash/Python scripting prior to attempting this course.
  • Course
    • Overview
      • Course Introduction
    • Introduction to Kali Linux
      • Installing Kali Linux
      • Command Line Refresher
      • Kali Linux Services
      • Bash Scripting in Kali Linux
    • Information Gathering
      • Information Gathering
    • Scanning
      • TCP vs UDP
      • Scanning with Nmap
      • Scanning with Nessus
      • Scanning with Metasploit
    • Enumeration
      • Installing Kioptrix: Level 1
      • SSH Enumeration
      • HTTP Enumeration
      • SMB Enumeration
      • DNS Enumeration
      • Other Enumeration
    • Netcat
      • Introduction to Netcat
    • Buffer Overflows
      • Introduction to Buffer Overflows
      • Fuzzing
      • Finding the Offset
      • Overwriting the EIP
      • Finding Bad Characters
      • Finding the Right Module
      • Generating Shellcode & Gaining Root
    • Exploitation
      • Gaining Root with Metasploit
      • Compiling an Exploit
      • Modifying Shellcode
      • Client Side Attacks
      • Java Applet Attacks
      • Antivirus Bypassing
      • Pre-Exploit Password Attacks
    • WebApp Exploitation
      • Installing XSS & MySQL FILE
      • Cross-Site Scripting (XSS)
      • SQL Injection (SQLi)
      • Local File Inclusion (LFI)
      • Remote File Inclusion (RFI)
    • File Transfers
      • Introduction to File Transfers
    • Privilege Escalation
      • Introduction to Privilege Escalation
    • Post Exploitation
      • Linux Post Exploitation
      • Windows Post Exploitation
      • Post-Exploit Password Attacks
      • Pivoting
    • Capstone
      • Kioptrix Level 1.1 Walkthrough
      • BTRSys 2.1 Walkthrough
      • DroopyCTF Walkthrough
      • SickOS 1.2 Walkthrough
    • Summary
      • Course Conclusion

 

Course Outline:
  • Course
    • Overview
      • Course Introduction
    • Introduction to Kali Linux
      • Installing Kali Linux
      • Command Line Refresher
      • Kali Linux Services
      • Bash Scripting in Kali Linux
    • Information Gathering
      • Information Gathering
    • Scanning
      • TCP vs UDP
      • Scanning with Nmap
      • Scanning with Nessus
      • Scanning with Metasploit
    • Enumeration
      • Installing Kioptrix: Level 1
      • SSH Enumeration
      • HTTP Enumeration
      • SMB Enumeration
      • DNS Enumeration
      • Other Enumeration
    • Netcat
      • Introduction to Netcat
    • Buffer Overflows
      • Introduction to Buffer Overflows
      • Fuzzing
      • Finding the Offset
      • Overwriting the EIP
      • Finding Bad Characters
      • Finding the Right Module
      • Generating Shellcode & Gaining Root
    • Exploitation
      • Gaining Root with Metasploit
      • Compiling an Exploit
      • Modifying Shellcode
      • Client Side Attacks
      • Java Applet Attacks
      • Antivirus Bypassing
      • Pre-Exploit Password Attacks
    • WebApp Exploitation
      • Installing XSS & MySQL FILE
      • Cross-Site Scripting (XSS)
      • SQL Injection (SQLi)
      • Local File Inclusion (LFI)
      • Remote File Inclusion (RFI)
    • File Transfers
      • Introduction to File Transfers
    • Privilege Escalation
      • Introduction to Privilege Escalation
    • Post Exploitation
      • Linux Post Exploitation
      • Windows Post Exploitation
      • Post-Exploit Password Attacks
      • Pivoting
    • Capstone
      • Kioptrix Level 1.1 Walkthrough
      • BTRSys 2.1 Walkthrough
      • DroopyCTF Walkthrough
      • SickOS 1.2 Walkthrough
    • Summary
      • Course Conclusion

Course Format Options:

Online Streaming

Train anywhere with our web, iOS, Android and Apple TV apps! You'll also have access to any course updates and additions.

Video Download

Download the entire course in mobile, high and HD(1080p) resolutions.

  • Regular price $329.99
  • Save


09hr 22min
March 2, 2018