INE-OSCP
by irdk - August 27, 2020 at 02:40 PM
Thanks in advance, can't wait to get my hands on the materials
Thank you, Really nice!
This will be very helpful
Thank you so much for this amazing content
(August 27, 2020 at 02:40 PM)irdk Wrote: INE-OSCP Security Technology Course

[Image: thq937Pl.png]

This course provides a foundation in advanced penetration testing that will prepare students for the Penetration Testing with Kali Linux (PWK) course offered by Offensive Security. The course will also prepare students for the Offensive Security Certified Professional (OSCP) exam, which typically proceeds the PWK course. Students should be familiar with Linux command line, common networking terminology, and basic Bash/Python scripting prior to attempting this course.


Course Introduction



  • Introduction to Kali Linux


  • Installing Kali Linux


  • Command Line Refresher


  • Kali Linux Services


  • Bash Scripting in Kali Linux


  • Information Gathering


  • Information Gathering


  • Scanning


  • TCP vs UDP


  • Scanning with Nmap


  • Scanning with Nessus


  • Scanning with Metasploit


  • Enumeration


  • Installing Kioptrix: Level 1


  • SSH Enumeration


  • HTTP Enumeration


  • SMB Enumeration


  • DNS Enumeration


  • Other Enumeration


  • Netcat


  • Introduction to Netcat


  • Buffer Overflows


  • Introduction to Buffer Overflows


  • Fuzzing


  • Finding the Offset


  • Overwriting the EIP


  • Finding Bad Characters


  • Finding the Right Module


  • Generating Shellcode & Gaining Root


  • Exploitation


  • Gaining Root with Metasploit


  • Compiling an Exploit


  • Modifying Shellcode


  • Client Side Attacks


  • Java Applet Attacks


  • Antivirus Bypassing


  • Pre-Exploit Password Attacks


  • WebApp Exploitation


  • Installing XSS & MySQL FILE


  • Cross-Site Scripting (XSS)


  • SQL Injection (SQLi)


  • Local File Inclusion (LFI)


  • Remote File Inclusion (RFI)


  • File Transfers


  • Introduction to File Transfers


  • Privilege Escalation


  • Introduction to Privilege Escalation


  • Post Exploitation


  • Linux Post Exploitation


  • Windows Post Exploitation


  • Post-Exploit Password Attacks


  • Pivoting


  • Capstone


  • Kioptrix Level 1.1 Walkthrough


  • BTRSys 2.1 Walkthrough


  • DroopyCTF Walkthrough


  • SickOS 1.2 Walkthrough


  • Summary

  • Course Conclusion



DOWNLOAD:
[Hidden Content]
Thank you. Is it like OSCP course?
this really look good, thank you in advance Smile
(August 27, 2020 at 02:40 PM)irdk Wrote: INE-OSCP Security Technology Course

[Image: thq937Pl.png]

This course provides a foundation in advanced penetration testing that will prepare students for the Penetration Testing with Kali Linux (PWK) course offered by Offensive Security. The course will also prepare students for the Offensive Security Certified Professional (OSCP) exam, which typically proceeds the PWK course. Students should be familiar with Linux command line, common networking terminology, and basic Bash/Python scripting prior to attempting this course.


Course Introduction



  • Introduction to Kali Linux


  • Installing Kali Linux


  • Command Line Refresher


  • Kali Linux Services


  • Bash Scripting in Kali Linux


  • Information Gathering


  • Information Gathering


  • Scanning


  • TCP vs UDP


  • Scanning with Nmap


  • Scanning with Nessus


  • Scanning with Metasploit


  • Enumeration


  • Installing Kioptrix: Level 1


  • SSH Enumeration


  • HTTP Enumeration


  • SMB Enumeration


  • DNS Enumeration


  • Other Enumeration


  • Netcat


  • Introduction to Netcat


  • Buffer Overflows


  • Introduction to Buffer Overflows


  • Fuzzing


  • Finding the Offset


  • Overwriting the EIP


  • Finding Bad Characters


  • Finding the Right Module


  • Generating Shellcode & Gaining Root


  • Exploitation


  • Gaining Root with Metasploit


  • Compiling an Exploit


  • Modifying Shellcode


  • Client Side Attacks


  • Java Applet Attacks


  • Antivirus Bypassing


  • Pre-Exploit Password Attacks


  • WebApp Exploitation


  • Installing XSS & MySQL FILE


  • Cross-Site Scripting (XSS)


  • SQL Injection (SQLi)


  • Local File Inclusion (LFI)


  • Remote File Inclusion (RFI)


  • File Transfers


  • Introduction to File Transfers


  • Privilege Escalation


  • Introduction to Privilege Escalation


  • Post Exploitation


  • Linux Post Exploitation


  • Windows Post Exploitation


  • Post-Exploit Password Attacks


  • Pivoting


  • Capstone


  • Kioptrix Level 1.1 Walkthrough


  • BTRSys 2.1 Walkthrough


  • DroopyCTF Walkthrough


  • SickOS 1.2 Walkthrough


  • Summary

  • Course Conclusion



DOWNLOAD:
[Hidden Content]


thanks youuuuu so muuuchhhh
Great material. Thanks for sharing.
If this helps me to clear oscp then...
I Really appreciate the share , Thanks in Advance
Thank you very much for sharing!
Thanks for the course! This is informative, gone learning

(August 27, 2020 at 02:40 PM)irdk dateline='1598535603' Wrote: INE-OSCP Security Technology Course

[Image: thq937Pl.png]

This course provides a foundation in advanced penetration testing that will prepare students for the Penetration Testing with Kali Linux (PWK) course offered by Offensive Security. The course will also prepare students for the Offensive Security Certified Professional (OSCP) exam, which typically proceeds the PWK course. Students should be familiar with Linux command line, common networking terminology, and basic Bash/Python scripting prior to attempting this course.


Course Introduction



  • Introduction to Kali Linux


  • Installing Kali Linux


  • Command Line Refresher


  • Kali Linux Services


  • Bash Scripting in Kali Linux


  • Information Gathering


  • Information Gathering


  • Scanning


  • TCP vs UDP


  • Scanning with Nmap


  • Scanning with Nessus


  • Scanning with Metasploit


  • Enumeration


  • Installing Kioptrix: Level 1


  • SSH Enumeration


  • HTTP Enumeration


  • SMB Enumeration


  • DNS Enumeration


  • Other Enumeration


  • Netcat


  • Introduction to Netcat


  • Buffer Overflows


  • Introduction to Buffer Overflows


  • Fuzzing


  • Finding the Offset


  • Overwriting the EIP


  • Finding Bad Characters


  • Finding the Right Module


  • Generating Shellcode & Gaining Root


  • Exploitation


  • Gaining Root with Metasploit


  • Compiling an Exploit


  • Modifying Shellcode


  • Client Side Attacks


  • Java Applet Attacks


  • Antivirus Bypassing


  • Pre-Exploit Password Attacks


  • WebApp Exploitation


  • Installing XSS & MySQL FILE


  • Cross-Site Scripting (XSS)


  • SQL Injection (SQLi)


  • Local File Inclusion (LFI)


  • Remote File Inclusion (RFI)


  • File Transfers


  • Introduction to File Transfers


  • Privilege Escalation


  • Introduction to Privilege Escalation


  • Post Exploitation


  • Linux Post Exploitation


  • Windows Post Exploitation


  • Post-Exploit Password Attacks


  • Pivoting


  • Capstone


  • Kioptrix Level 1.1 Walkthrough


  • BTRSys 2.1 Walkthrough


  • DroopyCTF Walkthrough


  • SickOS 1.2 Walkthrough


  • Summary

  • Course Conclusion



DOWNLOAD:
[Hidden Content]
Thanks mate,that is nice for me!

Possibly Related Threads…
Thread Author Replies Views Last Post
INE - OSCP Security Technology Course TJ_Infra 3 234 June 14, 2021 at 01:08 PM
Last Post: TJ_Infra
216+ GB INE CISCO Courses Collection Befull 12 746 March 22, 2021 at 02:59 PM
Last Post: Jaw

 Users browsing this thread: 1 Guest(s)