Curriculum
- 10 Sections
- 9 Lessons
- 126 Hours
Expand all sectionsCollapse all sections
- Module 1: Introduction to Penetration Testing1
- Module 2: Information Gathering & Enumeration1
- Module 3: Vulnerability AssessmentEmploy advanced ethical hacking techniques and tools like Nmap and Shodan to meticulously map target systems, uncover potential entry points, and discover exploitable vulnerabilities.0
- Module 4: Exploitation Techniques1
- Module 5: Privilege Escalation1
- Module 6: Active Directory Basics1
- Module 7: Buffer Overflow Essentials1
- Module 8: Post-Exploitation & Pivoting1
- Module 9: OSCP Exam Preparation1
- Module 10 : Real World Labs1
Utilize powerful tools like Nessus and OpenVAS to systematically identify known vulnerabilities in networks, applications, and systems, streamlining your penetration testing process.
Prev
Explore the techniques behind prevalent web attacks like cross-site scripting (XSS), injection flaws, and session hijacking, and learn essential mitigation strategies.
Next

