Curriculum
- 10 Sections
- 9 Lessons
- 126 Hours
Expand all sectionsCollapse all sections
- Module 1: Introduction to Penetration Testing1
- Module 2: Information Gathering & Enumeration1
- Module 3: Vulnerability AssessmentEmploy advanced ethical hacking techniques and tools like Nmap and Shodan to meticulously map target systems, uncover potential entry points, and discover exploitable vulnerabilities.0
- Module 4: Exploitation Techniques1
- Module 5: Privilege Escalation1
- Module 6: Active Directory Basics1
- Module 7: Buffer Overflow Essentials1
- Module 8: Post-Exploitation & Pivoting1
- Module 9: OSCP Exam Preparation1
- Module 10 : Real World Labs1
Discover how to exploit vulnerabilities in web browsers, browser extensions, and client-side technologies like JavaScript to compromise user systems and gain unauthorized access.
Prev
Adapt and customize existing exploits, employ obfuscation techniques, and develop creative payloads to bypass defenses and successfully test target systems.
Next

