Curriculum
- 10 Sections
- 9 Lessons
- 126 Hours
Expand all sectionsCollapse all sections
- Module 1: Introduction to Penetration Testing1
- Module 2: Information Gathering & Enumeration1
- Module 3: Vulnerability AssessmentEmploy advanced ethical hacking techniques and tools like Nmap and Shodan to meticulously map target systems, uncover potential entry points, and discover exploitable vulnerabilities.0
- Module 4: Exploitation Techniques1
- Module 5: Privilege Escalation1
- Module 6: Active Directory Basics1
- Module 7: Buffer Overflow Essentials1
- Module 8: Post-Exploitation & Pivoting1
- Module 9: OSCP Exam Preparation1
- Module 10 : Real World Labs1
Gain a deep understanding of how web applications function, their underlying technologies, and the architectural weaknesses that give rise to common attack vectors.
Prev
Master the art of manipulating databases via SQL injections to extract sensitive information, compromise backend systems, and escalate your privileges.
Next

