OSCP

OFFENSIVE SECURITY CERTIFIED PROFESSIONAL
🔑 Course Highlights:
Foundational Knowledge: Grasp the essentials of ethical hacking and cybersecurity.
Hands-On Learning: Explore real-world hacking techniques in a legal and ethical environment.
Practical Skills: Learn to detect and defend against common cyber threats.
Expert Guidance: Get mentored by professionals with real-world experience.
👥 Who Should Join?
Beginners: No prior experience required—just a passion for learning.
Tech Enthusiasts: Ready to explore the exciting world of cybersecurity.
Career Seekers: Take your first step toward a rewarding career in ethical hacking.
Discord Enthusiasts: A Discord account is required to participate and connect
🚀 Why Join?
Interactive Modules: Hands-on exercises tailored for beginners.
Real-World Focus: Apply techniques in safe, controlled environments.
Flexible Access: Learn at your own pace, anytime, anywhere.
Community Support: Connect with like-minded learners on Discord.
Course Outline: What You’ll Learn
Module 1- (35 min)
E1- Introduction to Cyber Security
Module 2- Advanced Command Line (95 min)
E2- Linux Essentials & Keyboard Shortcuts
E3-File Permission
E4-Linux File Management
E5-Mannaging Process and Downloading Files
E6-Piping,Redirecting ,Text Searching and Manipulation
Module 3- Network Practical Tools (80 min)
E7-Netcat
E8-Socat
E9-Powershell
E10-Powercat
Module 4- Wireshark (85 min)
E11-Advanced Wireshark
E12-Tactical Wireshark
Module 5- Bash Scripting (80 min)
E13-Introduction-Variables-Arguments
E14-If-else-Elif-Logical operations
E15-Loops-Function
E16-Practical Exercise (Creating our own Tool)
Module 6- Active Information Gathering (125 min)
E17-DNS Enumeration
E18-NFS,SMTP,SNMP Enumeration
E19-Nmap TCP-UDP Port Scanning
E20-NSE,OS,Service,Enumeration,Masscan
E21-SMB,Netbios Enumeration
E22-TCP-UDP Port Scanning
Module 7- Vulnerability Scanning with Nessus (50 min)
E23-Nessus Installation
E24-Nessus Walkthrough
Module 8- Web App Attacks (330 min)
E25-Introduction to Web app
E26-Web app Essentials
E27-Web app Enumeration & Assessment Tools (Fuzzing)
E28-Assessment Tools (Test Vulnerabilities)
E29-Zap Proxy & Burp Suit
E30-Reflected XSS
E31-Stored XSS
E32-Introduction to SQL injection
E33- SQL Exploitation …
Module 9- Client Side Attacks (20 min)
E34-Attacks with social Engineering
Module 10- Public Exploits (40 min)
E35- Locating Public Exploits
E36- Exploiting Public Exploits
Module 11- Privilege Escalation (135 min)
E37- Manual Privilege Escalation
E38- Windows Privilege Escalation (Experimental labs)
E39- Linux Privilege Escalation (Experimental Labs)
Module 12- Password Attacks(48 min)
E40-Introducction to password Cracking
E41-Sam and Shadow Hash Folders
Module 13- Port Redirection and Tunneling (20 min)
E42- SSH Tunneling and Port Forwarding
Module 14- Active Directory Attacks
E43- Introduction-Lab Installation (Server and Managing Domain Controller)
E44- Enumeration and Authentication (NTLM & Kerberos)
E45-Attacks and Full Control
Module 15- Metasploit Framework(70 min)
E46- Introductions-Auxiliary
E47-Exploits-Payloads
E48-Post Exploitation-Metasploit Automation
Module 16- PowerShell Empire (70 min)
E49- Introduction-Installation-Overview
E50- Privilege Escalation- Modules
E51- Persistent Mode – Interaction with Metasploit
E52- StarKiller (GUI Empire PowerShell)