Curriculum
- 10 Sections
- 9 Lessons
- 126 Hours
Expand all sectionsCollapse all sections
- Module 1: Introduction to Penetration Testing1
- Module 2: Information Gathering & Enumeration1
- Module 3: Vulnerability AssessmentEmploy advanced ethical hacking techniques and tools like Nmap and Shodan to meticulously map target systems, uncover potential entry points, and discover exploitable vulnerabilities.0
- Module 4: Exploitation Techniques1
- Module 5: Privilege Escalation1
- Module 6: Active Directory Basics1
- Module 7: Buffer Overflow Essentials1
- Module 8: Post-Exploitation & Pivoting1
- Module 9: OSCP Exam Preparation1
- Module 10 : Real World Labs1
Explore the techniques behind prevalent web attacks like cross-site scripting (XSS), injection flaws, and session hijacking, and learn essential mitigation strategies.
Prev
Discover how to exploit vulnerabilities in web browsers, browser extensions, and client-side technologies like JavaScript to compromise user systems and gain unauthorized access.
Next

