Curriculum
- 10 Sections
- 9 Lessons
- 126 Hours
Expand all sectionsCollapse all sections
- Module 1: Introduction to Penetration Testing1
- Module 2: Information Gathering & Enumeration1
- Module 3: Vulnerability AssessmentEmploy advanced ethical hacking techniques and tools like Nmap and Shodan to meticulously map target systems, uncover potential entry points, and discover exploitable vulnerabilities.0
- Module 4: Exploitation Techniques1
- Module 5: Privilege Escalation1
- Module 6: Active Directory Basics1
- Module 7: Buffer Overflow Essentials1
- Module 8: Post-Exploitation & Pivoting1
- Module 9: OSCP Exam Preparation1
- Module 10 : Real World Labs1
Master the art of manipulating databases via SQL injections to extract sensitive information, compromise backend systems, and escalate your privileges.
Prev
Learn where to find reliable public exploits, how to assess their applicability, and how to integrate them responsibly into your security testing workflow.
Next

