Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Cybrary

Offensive Penetration Testing

via Cybrary

Overview

This Offensive Penetration Testing (OSCP) training will primarily be hands-on and build familiarity from basic hacking concepts to more advanced exploitation techniques, while also demonstrating through video lectures to teach learners penetration testing methodologies and tools. The course will cover how to set up Kali Linux and use the tools within it to perform a penetration test by learning how to scan targets, conduct enumeration to find vulnerabilities within networks as well as web applications, modify exploit code to fit the environment to successfully exploit the target, obtain a shell on a target, and then escalate privileges to successfully “own” a target all in a controlled and organized manner in preparation to write a comprehensive penetration test report. Learners will also become familiar with how to write the penetration test report as this is an equally important requirement for their pentesting career. This course will also help learners develop the hacker mindset of how to think laterally and with agility while under stress and a time limit in order to successfully exploit targets. This course is equally beneficial for those with a basic level of knowledge of penetration testing and want more hands-on experience to hone their skills.

This is a deep course about penetration testing. In this OSCP training course, you’ll learn from basic to the most advanced and modern techniques to find vulnerabilities through information gathering, create and/or use exploits and be able to escalate privileges in order to test your information systems defenses.

Prerequisites for this OSCP Training Online

  • Solid understanding of TCP/IP networking
  • Reasonable Windows and Linux administration experience
  • Familiarity with the Windows and Linux command line
  • Familiarity of Bash scripting with basic Python

Course Goals

By the end of this course, students should be able to:

  • Set up Kali Linux and understand the tools it has available
  • Conduct a full penetration test
  • Write a comprehensive penetration test report
  • Understand what the hacker mindset is and help develop it

What Is Offensive Security (OSCP)?

Offensive security allows developers to find vulnerabilities within a system or application by gathering information. Then, the developer creates exploits to escalate privileges in order to test the information systems’ defenses.

Think of offensive security as a proactive approach to protecting websites and applications. Offensive security training provides developers with penetration testing methodologies and provides them with the knowledge to utilize the tools included with the Kali Linux distribution.

How Do You Prepare For an Offensive Penetration Testing Certification?

Before pursuing an offensive penetration testing certification, having specific prerequisites will help you successfully complete the course. Students should have a robust IT Background, InfoSec knowledge, ethical Hacking knowledge, and basic programming skills.

How Do You Pass an Offensive Penetration Testing Certification?

The best way to earn the offensive penetration testing certification is to take an online course such as Cybrary’s offensive security training course.

Cybrary’s course allows students to take the course online, which allows for flexibility to start and stop the videos when it’s convenient for students. Cybrary’s offensive security training will enable students to practice pen tests in a lab and erase their tracks in Labs.

Is an Offensive Penetration Testing Certification Worth It?

By the end of this offensive security training course, students will understand how to use passive and active reconnaissance techniques, as well as use basic and advanced scanning and information harvesting techniques. The goal is for developers to be able to create code to exploit vulnerabilities and recognize legitimate public exploits from fake exploits.

Upon obtaining OSCP certification, students will also be able to:

  • Use and modify public exploits
  • Use several techniques to gain access to a system from both remote and local side
  • Use several methods to escalate privileges
  • Clear your tracks
  • Perform lateral and vertical jumps between systems
  • Use tunnels to compromise other computers on the network or hide your traffic.

OSCP training online will help developers in their careers by giving them the skills needed to create executive reports with the results of the pen test and present the findings to your managers.

What Should I Do After The OSCP Training Online?

Once you’ve finished this OSCP training, it’s time to utilize your knowledge and skills in the professional world. Having offensive penetration skills on your resume can help you advance your career and earn a coveted role.

Syllabus

  • Course Introduction
    • Course Overview
  • Setting the Foundation for Success
    • Understanding the Penetration Test Report
    • Penetration Test Report Demo
    • Note Taking and Mind Mapping
    • Finding Resources to Prepare for the Offensive Penetration Testing
  • Kali Linux Basics
    • Setting up the Kali Linux VM
    • Overview of Tools in Kali Linux
    • Understanding the Command Line
    • Who, What, When, Where and How of the Linux Command Line
    • Windows Command Lab
    • Command Line Lab
    • Command Line
    • Command Line Lab Walkthrough
  • Understanding Network Protocols
    • Scanning Network Protocols
    • Scanning with Nmap
    • Scanning with Masscan
    • Scanning with Netcat
    • Using Wireshark
    • Wireshark and Encrypted Traffic
    • Weaponizing Wireshark
    • SMB Enumeration
    • SMB Enumeration Demo
    • NFS Enumeration
    • SMTP Enumeration
    • SNMP Enumeration
    • FTP Enumeration
    • FTP Enumeration Demo
    • SSH Enumeration
    • Protocol Tips
    • Network Protocols Lab
    • Network Protocols
  • Web Application Penetration Testing
    • Web Application Enumeration
    • Using Intercepting Proxies Part 1
    • Using Intercepting Proxies Part 2
    • SQL Injections
    • SQL Injection Authentication Bypass
    • Cross-Site Scripting (XSS)
    • BeEF Framework Demo
    • File Inclusion Vulnerabilities
    • File Inclusion Demo
    • File Upload Vulnerabilities
    • XXE Attacks
    • Content Management Systems
    • Content Management Systems Demo
    • Web Application Lab
    • Web Application Attacks
    • Web Application Lab Walkthrough
  • Introduction to Buffer Overflow
    • How to Practice Buffer Overflows
    • Setting up the Environment
    • Fuzzing the Application
    • Finding Bad Characters
    • Finding the Return Address
    • Getting a Shell
    • Buffer Overflow Lab
    • Buffer Overflow Attack
  • Public Exploits
    • Where to Look for Public Exploits
    • Understanding the Code
    • Modifying the Code to Fit the Environment
    • Introduction to Metasploit
    • Using Metasploit or Not
    • Public Exploit Lab
    • Public Exploit
    • Public Exploit Lab Walkthrough
  • Getting a Shell, Now What?
    • The Different Types of Shells
    • How to Upgrade a Shell
    • Transferring Files to and from Kali Linux
    • Transferring Files Demo
  • Privilege Escalation
    • Linux Privilege Escalation
    • Windows Privilege Escalation
    • A Word on Privilege Escalation Enumeration Scripts
    • Privilege Escalation Lab
    • Privilege Escalation
    • Privilege Escalation Walkthrough: Windows
    • Privilege Escalation Walkthrough: Linux
  • Password Cracking and Brute-Forcing Logins
    • Introduction to Password Cracking Tools
    • Introduction to Login Brute-Forcing Tools
    • Password Brute-Forcing Web Logins
    • Password Brute-Forcing Tips
    • Brute-Force and Password Cracking Lab
    • Password Cracking
    • Brute-Force and Password Cracking Lab Walkthrough
  • Putting it All Together
    • Hands-on Penetration Test Lab
    • Offensive Penetration Testing - Capstone
    • Hands-on Penetration Test Lab Walkthrough
    • Writing the Report
  • Developing the Hacker Mindset
    • Understanding the Hacker Mindset
    • Tips on Harnessing the Hacker Mindset

Taught by

Clint Kehr

Reviews

Start your review of Offensive Penetration Testing

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.