top of page

Sun, 21 Apr


OSCP Certification Training

Kick start your Certifications Training with us. It is important to understand application of various security certification and which fits best for your career. If you find OSCP certification as the fitting next step, join our affordable training programs. **Special discount for Students**

Tickets are not on sale
See other events
OSCP Certification Training
OSCP Certification Training

Time & Location

21 Apr 2024, 10:00 am – 21 May 2024, 10:00 am

About the event

Course Overview

Our Training program will follow the sequence of OSCP Certification Syllabus. However, practice lab for each section will be covering more than the labs offered in the syllabus so that you get comprehensive knowledge and hands-on variety of labs.

Trainer: Swati Laxmi

There will be 1 Assisting trainer (Industry expert with OSCP)

Module 01: Introduction to Penetration Testing 

1.1 Understanding the Role of Penetration Testing in Cybersecurity

1.2 Methodologies and Frameworks in Penetration Testing


Module 02: Operating System Proficiency with Kali Linux 

2.1 Navigating Kali Linux Environment

2.2 Utilizing Kali Linux Tools for Security Testing


Module 03: Mastering Command Line Operations 

3.1 Command Line Essentials for Penetration Testing

3.2 Advanced Command Line Techniques


Module 04: Essential Tools for Penetration Testing 

4.1 Selection Criteria for Penetration Testing Tools

4.2 Practical Applications of Penetration Testing Tools


Module 05: Bash Scripting for Automation 

5.1 Introduction to Bash Scripting

5.2 Automating Penetration Testing Tasks with Bash


Module 06: Passive Information Gathering Techniques 

6.1 Understanding Passive Information Gathering

6.2 Tools and Techniques for Passive Reconnaissance


Module 07: Active Information Gathering Techniques 

7.1 Conducting Active Reconnaissance Safely

7.2 Leveraging Active Information Gathering Tools


Module 08: Vulnerability Scanning 

8.1 Fundamentals of Vulnerability Scanning

8.2 Performing Vulnerability Assessments with Tools


Module 09: Web Application Attacks 

9.1 Understanding Web Application Vulnerabilities

9.2 Exploiting Web Applications for Penetration Testing


Module 10: Introduction to Buffer Overflows 

10.1 Understanding Buffer Overflows

10.2 Identifying and Exploiting Buffer Overflow Vulnerabilities


Module 11: Windows Buffer Overflows 

11.1 Windows-Specific Buffer Overflow Techniques

11.2 Exploiting Buffer Overflows in Windows Systems


Module 12: Linux Buffer Overflows 

12.1 Linux-Specific Buffer Overflow Techniques

12.2 Exploiting Buffer Overflows in Linux Systems


Module 13: Client-Side Attacks 

13.1 Techniques for Client-Side Exploitation

13.2 Exploiting Client Applications for Penetration Testing


Module 14: Exploit Discovery and Utilization 

14.1 Locating and Analyzing Public Exploits

14.2 Customizing and Deploying Exploits


Module 15: Exploit Remediation 

15.1 Understanding Patch Management

15.2 Mitigating Exploits in Vulnerable Systems


Module 16: File Transfers in Penetration Testing 

16.1 Secure File Transfer Techniques

16.2 Exfiltrating Data During Penetration Testing


Module 17: Antivirus Evasion Techniques 

17.1 Evading Antivirus Detection

17.2 Leveraging Antivirus Evasion Tools


Module 18: Privilege Escalation 

18.1 Understanding Privilege Escalation Paths

18.2 Exploiting Privilege Escalation Vulnerabilities


Module 19: Password Attacks 

19.1 Techniques for Password Cracking

19.2 Password Attack Strategies in Penetration Testing


Module 20: Port Redirection and Tunneling 

20.1 Port Redirection Fundamentals

20.2 Utilizing Port Redirection for Penetration Testing


Module 21: Active Directory Attacks 

21.1 Understanding Active Directory Vulnerabilities

21.2 Exploiting Active Directory for Penetration Testing


Module 22: Utilizing the Metasploit Framework 

22.1 Introduction to Metasploit Framework

22.2 Leveraging Metasploit for Exploitation


Module 23: PowerShell Empire 

23.1 Exploring PowerShell Empire Capabilities

23.2 Harnessing PowerShell Empire in Penetration Testing


Module 24: Penetration Test Breakdown 

24.1 Understanding the Penetration Testing Process

24.2 Analyzing and Reporting Penetration Test Results


Module 25: Advanced Penetration Testing Labs 

25.1 Hands-on Challenges for Penetration Testing Skills Enhancement

25.2 Real-World Scenario Simulations for Advanced Practitioners

Course Duration (total 120 hours)

Saturday/Sunday 11 AM - 3 PM

Saturday/Sunday 7 PM - 11 PM


Weekdays - 9 PM - 11 PM


We will be using different resources and techniques to get the complete attacking and defending AD like HTB rooms, Simulated lab by Defhawk, Try hack me rooms and labs from Altered Security / pentester academy to get both theoretical and practical hands on experience etc.

Training Completion Certificate Attendees will also get a course completion certificate after completing Learning Objectives covered during the course.

Share this event

bottom of page