top of page

Sun, 21 Apr

|

https://discord.gg/ZFBjXPegWA

OSCP Certification Training

Kick start your Certifications Training with us. It is important to understand application of various security certification and which fits best for your career. If you find OSCP certification as the fitting next step, join our affordable training programs. **Special discount for Students**

Tickets are not on sale
See other events
OSCP Certification Training
OSCP Certification Training

Time & Location

21 Apr 2024, 10:00 am – 21 May 2024, 10:00 am

https://discord.gg/ZFBjXPegWA

About the event

Course Overview

Our Training program will follow the sequence of OSCP Certification Syllabus. However, practice lab for each section will be covering more than the labs offered in the syllabus so that you get comprehensive knowledge and hands-on variety of labs.

Trainer: Swati Laxmi

There will be 1 Assisting trainer (Industry expert with OSCP)

Module 01: Introduction to Penetration Testing 

1.1 Understanding the Role of Penetration Testing in Cybersecurity

1.2 Methodologies and Frameworks in Penetration Testing

LAB01

Module 02: Operating System Proficiency with Kali Linux 

2.1 Navigating Kali Linux Environment

2.2 Utilizing Kali Linux Tools for Security Testing

LAB02

Module 03: Mastering Command Line Operations 

3.1 Command Line Essentials for Penetration Testing

3.2 Advanced Command Line Techniques

LAB03

Module 04: Essential Tools for Penetration Testing 

4.1 Selection Criteria for Penetration Testing Tools

4.2 Practical Applications of Penetration Testing Tools

LAB04

Module 05: Bash Scripting for Automation 

5.1 Introduction to Bash Scripting

5.2 Automating Penetration Testing Tasks with Bash

LAB05

Module 06: Passive Information Gathering Techniques 

6.1 Understanding Passive Information Gathering

6.2 Tools and Techniques for Passive Reconnaissance

LAB06

Module 07: Active Information Gathering Techniques 

7.1 Conducting Active Reconnaissance Safely

7.2 Leveraging Active Information Gathering Tools

LAB07

Module 08: Vulnerability Scanning 

8.1 Fundamentals of Vulnerability Scanning

8.2 Performing Vulnerability Assessments with Tools

LAB08

Module 09: Web Application Attacks 

9.1 Understanding Web Application Vulnerabilities

9.2 Exploiting Web Applications for Penetration Testing

LAB09

Module 10: Introduction to Buffer Overflows 

10.1 Understanding Buffer Overflows

10.2 Identifying and Exploiting Buffer Overflow Vulnerabilities

LAB10

Module 11: Windows Buffer Overflows 

11.1 Windows-Specific Buffer Overflow Techniques

11.2 Exploiting Buffer Overflows in Windows Systems

LAB11

Module 12: Linux Buffer Overflows 

12.1 Linux-Specific Buffer Overflow Techniques

12.2 Exploiting Buffer Overflows in Linux Systems

LAB12

Module 13: Client-Side Attacks 

13.1 Techniques for Client-Side Exploitation

13.2 Exploiting Client Applications for Penetration Testing

LAB13

Module 14: Exploit Discovery and Utilization 

14.1 Locating and Analyzing Public Exploits

14.2 Customizing and Deploying Exploits

LAB14

Module 15: Exploit Remediation 

15.1 Understanding Patch Management

15.2 Mitigating Exploits in Vulnerable Systems

LAB15

Module 16: File Transfers in Penetration Testing 

16.1 Secure File Transfer Techniques

16.2 Exfiltrating Data During Penetration Testing

LAB16

Module 17: Antivirus Evasion Techniques 

17.1 Evading Antivirus Detection

17.2 Leveraging Antivirus Evasion Tools

LAB17

Module 18: Privilege Escalation 

18.1 Understanding Privilege Escalation Paths

18.2 Exploiting Privilege Escalation Vulnerabilities

LAB18

Module 19: Password Attacks 

19.1 Techniques for Password Cracking

19.2 Password Attack Strategies in Penetration Testing

LAB19

Module 20: Port Redirection and Tunneling 

20.1 Port Redirection Fundamentals

20.2 Utilizing Port Redirection for Penetration Testing

LAB20

Module 21: Active Directory Attacks 

21.1 Understanding Active Directory Vulnerabilities

21.2 Exploiting Active Directory for Penetration Testing

LAB21

Module 22: Utilizing the Metasploit Framework 

22.1 Introduction to Metasploit Framework

22.2 Leveraging Metasploit for Exploitation

LAB22

Module 23: PowerShell Empire 

23.1 Exploring PowerShell Empire Capabilities

23.2 Harnessing PowerShell Empire in Penetration Testing

LAB23

Module 24: Penetration Test Breakdown 

24.1 Understanding the Penetration Testing Process

24.2 Analyzing and Reporting Penetration Test Results

LAB24

Module 25: Advanced Penetration Testing Labs 

25.1 Hands-on Challenges for Penetration Testing Skills Enhancement

25.2 Real-World Scenario Simulations for Advanced Practitioners

Course Duration (total 120 hours)

Saturday/Sunday 11 AM - 3 PM

Saturday/Sunday 7 PM - 11 PM

OR

Weekdays - 9 PM - 11 PM

Resources

We will be using different resources and techniques to get the complete attacking and defending AD like HTB rooms, Simulated lab by Defhawk, Try hack me rooms and labs from Altered Security / pentester academy to get both theoretical and practical hands on experience etc.

Training Completion Certificate Attendees will also get a course completion certificate after completing Learning Objectives covered during the course.

Share this event

bottom of page