YoVDO

Offensive Penetration Testing

Offered By: LinkedIn Learning

Tags

Cybersecurity Courses Ethical Hacking Courses Penetration Testing Courses Kali Linux Courses Buffer Overflow Courses Web Application Security Courses Network Protocols Courses Password Cracking Courses Exploit Development Courses Privilege Escalation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Boost your skills as an ethical hacker to prepare for certifications such as the Offensive Security Certified Professional (OSCP) certification exam.

Syllabus

Introduction
  • Offensive penetration testing course overview
1. Setting the Foundation for Success
  • Understanding the penetration test report
  • Penetration test report demo
  • Note-taking and mind mapping
  • Finding resources to prepare for the offensive penetration testing
2. Kali Linux Basics
  • Setting up the Kali Linux VM
  • Overview of the tools in Kali Linux
  • Understanding the command line
  • Who, what, when, where, and how of the Linux command line
  • Windows command lab
  • Command line lab
  • Command line lab walkthrough
3. Understanding Network Protocols
  • Scanning network protocols
  • Scanning with Nmap
  • Scanning with MASSCAN
  • Scanning with Netcat
  • Using Wireshark
  • Wireshark and Encrypted Traffic
  • Weaponizing Wireshark
  • SMB enumeration
  • SMB enumeration demo
  • NFS enumeration
  • SMTP enumeration
  • SNMP enumeration
  • FTP enumeration
  • FTP enumeration demo
  • SSH enumeration
  • Protocol tips
  • Network Protocols Lab
4. Web Application Penetration Testing
  • Web application enumeration
  • Using intercepting proxies: Part 1
  • Using intercepting proxies: Part 2
  • SQL injections
  • SQL injection authentication bypass
  • Cross-Site Scripting (XSS)
  • BeEF demo
  • File inclusion vulnerabilities
  • File inclusion demo
  • File upload vulnerabilities
  • XXE attacks
  • Content management systems
  • Content management systems demo
  • Web application lab
  • Web application lab walkthrough
5. Introduction to Buffer Overflow
  • How to practice buffer overflows
  • Setting up the environment
  • Fuzzing the application
  • Finding bad characters
  • Finding the return address
  • Getting a shell
  • Buffer overflow lab
6. Public Exploits
  • Where to look for public exploits
  • Understanding the code
  • Modifying the code to fit the environment
  • Introduction to Metasploit
  • Using Metasploit or not
  • Public exploit lab
  • Public exploit lab walkthrough
7. Getting a Shell, Now What?
  • The different types of shells
  • How to upgrade a shell
  • Transferring files to and from Kali Linux
  • Transferring files demo
8. Privilege Escalation
  • Linux privilege escalation
  • Windows privilege escalation
  • A word on privilege escalation enumeration scripts
  • Privilege escalation lab
  • Privilege escalation walkthrough: Windows
  • Privilege escalation walkthrough: Linux
9. Password Cracking and Brute-Forcing Logins
  • Introduction to password cracking tools
  • Introduction to login brute-forcing tools
  • Password brute-forcing web logins
  • Password brute-forcing tips
  • Brute-force and password-cracking lab
  • Brute-force and password-cracking lab walkthrough
10. Putting It All Together
  • Hands-on penetration test lab
  • Hands-on penetration test lab walkthrough
  • Writing the report
11. Developing the Hacker Mindset
  • Understanding the hacker mindset
  • Tips on harnessing the hacker mindset

Taught by

Cybrary

Related Courses

CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent
Penetration Testing: Advanced Kali Linux
LinkedIn Learning
Reverse Engineering Linux 32-bit Applications
PentesterAcademy
Exploit Development and Execution with the Metasploit Framework
Pluralsight
Security for Hackers and Developers: Exploit Development
Pluralsight