Coursector

دورة اختبار الاختراق OSCP

a_modern_professi_image_.png
Instructor
coursector
5
1 review
Course details
Duration : 35+ Hours
Lectures : 35
Video : 35
Level :
  • Description
  • Notice
  • Reviews
  1. Penetration Testing Course Content

PRELIMINARY SKILLS (PREREQUISITES & PROGRAMMING)

Module 1: Introduction to Pentesting and Information Security

  • Introduction to Information Security
  • Information Security Attacks and Information Security Controls
  • Hacking Concepts
  • Introduction to Penetration Testing
  • Lifecycle of a Penetration Test
    • Engagement
    • Information Gathering
    • Footprinting and Scanning
    • Vulnerability Assessment
    • Exploitation and Reporting
  • Examples of Vulnerabilities
  • Red Team vs. Blue Team
  • Capture The Flag (CTF)

Module 2: Networking

  • Network Fundamentals
  • Types of Networks
  • Network Topologies
  • The 7 Layers of the OSI Model
    • Layer 7 – Application
    • Layer 6 – Presentation
    • Layer 5 – Session
    • Layer 4 – Transport
    • Layer 3 – Network
    • Layer 2 – Data Link
    • Layer 1 – Physical

Module 3: Bash Scripting

  • Introduction to Bash
  • Linux Commands
  • Linux File Permissions
  • Programming using Bash
  • Variables and User Input
  • Shell Programming – Arithmetic Operators

Module 4: Web Applications

  • Introduction to Web Applications
  • HTTP Protocol Basics
  • HTTP Cookies
  • Sessions
  • Same Origin Policy
  • Burp Suite

PENETRATION TESTING

Module 5: Reconnaissance & Information Gathering

  • Information Gathering Introduction
  • Types of Information Gathering
  • Open-Source Intelligence (OSINT)
  • Advanced Google Hacking Techniques
  • Search Engines and Advanced Google Search Operators
  • Social Networks Information Gathering and Social Engineering
  • Public Sites Information Gathering
  • Metadata, METAGOOFIL, and theHarvester
  • Infrastructure – Domain Enumeration
    • WHOIS
    • DNS Enumeration
    • SHODAN and Maltego
    • Subdomain Enumeration
  • The Importance of Information Gathering

Module 6: Footprinting and Scanning

  • Network Discovery and Mapping
  • Scanning Goals and Types
  • Mapping a Network
  • Why Map a (Remote) Network
  • Network Sweeping
  • Ping Sweeping
  • Nmap Ping Scan
  • Network Fingerprinting
    • Identifying Operating Systems
    • Active Fingerprinting vs. Passive Fingerprinting
  • Network Scanning
    • Port Scanning (TCP & UDP)
    • Services Scanning (Nmap, Metasploit, Netcat)

Module 7: Advanced Scanning Techniques

  • Wireshark for Penetration Testers
  • Firewall / IDS Evasion Techniques
    • Timing Options
    • Fragment Packets
    • Specify a Specific MTU
    • Decoy Scans
    • Source Port Number Specification
    • Append Random Data
    • Send Bad Checksums
    • Idle Zombie Scan

Module 8: Vulnerability Assessment

  • Vulnerability Assessment Fundamentals
  • Vulnerability Scanners
    • Nessus
    • OpenVAS
    • NMAP Scripting Engine (NSE)
  • Manual Testing
  • Under the Hood of a Vulnerability Scanner
    • Port Scanning
    • Service Detection
    • Vulnerabilities Database Lookup

Module 9: Network Attacks

9.1 Authentication Cracking

  • Brute Force vs. Dictionary Attacks
  • Weak and Default Credentials
  • Installing Dictionaries
  • Authentication Cracking Tools (Hydra)
    • Telnet Attack Example
    • HTTP Basic Auth Attack Example

9.2 Windows Shares

  • NetBIOS
  • Shares and UNC Paths
  • Administrative Shares
  • Badly Configured Shares

9.3 Null Sessions

  • Enumerating Windows Shares
  • Checking for Null Sessions (Windows & Linux)
  • Exploiting Null Sessions

9.4 ARP Poisoning

  • ARP Poisoning Actors
  • Gratuitous ARP Replies
  • Forwarding and Mangling Packets
  • Local to Remote Man-in-the-Middle
  • Dsniff Arpspoof

9.5 Metasploit

  • MSFConsole
  • Identifying a Vulnerable Service
  • Searching for Exploits
  • Configuring an Exploit & Payload
  • Running an Exploit

9.6 Meterpreter

  • Bind and Reverse Shells
  • Launching Meterpreter
  • Sessions Management
  • Information Gathering with Meterpreter
    • System Information
    • Network Configuration
    • Routing Information
    • Current User

9.7 Privilege Escalation

  • Bypassing UAC
  • Dumping the Password Database
  • Exploring the Victim System
  • Uploading and Downloading Files
  • Running an OS Shell

9.8 Antivirus Evasion

Module 10: Anonymity

  • Using Anonymity During Network Testing
  • Browsing Anonymously
  • HTTP Proxies
  • ProxyChains
  • Tunneling for Anonymity (SSH Tunneling)

Module 11: System Attacks

11.1 Malware

  • Viruses
  • Trojan Horses
  • Backdoors
  • Firewalls vs. Backdoors
  • Rootkits & Bootkits
  • Adware, Spyware, Greyware
  • Keyloggers (Hardware & Software)
  • Bots, Ransomware, Data-Stealing Malware
  • Worms

11.2 Password Attacks

  • Cryptography Basics
  • Types of Cryptography
  • Password Attacks
    • Dictionary Attacks
    • Brute Force Attacks
    • Hash Cracking (John the Ripper, Ophcrack)
    • Rainbow Tables
    • Pass-the-Hash Attack

11.3 Buffer Overflow

  • How Buffer Overflow Attacks Work
  • Stack Buffer Overflow
  • Buffer Overflow Example

Module 12: Web Attacks

  • Web Application Assessment Methodology
  • Web Application Assessment Tools
  • Web Application Enumeration
  • Common Web Application Attacks
    • Cross-Site Scripting (XSS)
    • File Inclusion Vulnerabilities
    • File Upload Vulnerabilities
    • SQL Injections
    • Manual SQL Exploitation
    • Manual and Automated Code Execution

Module 13: Active Directory Attacks

  • Introduction to Active Directory
  • Active Directory Enumeration (Manual & Automated)
  • Identifying Weak Domain Accounts
  • AS-REP Roasting (Stealing Kerberos Tickets)
  • Lateral Movement Techniques
    • Pass-the-Hash
    • Pass-the-Ticket
  • Obtaining Domain Admin Privileges

Module 14: Next Steps

  • Career Guidance in Cybersecurity
  • Continuing Education Pathways
  • Real-World Penetration Testing Scenarios

Module 15: Penetration Testing and Capture the Flag (CTF) Labs

  • Practical Hands-on Challenges
  • Simulated Penetration Testing Engagements
  • CTF-Style Competitions

 

Penetration Testing Course: Legal & Ethical Notice

IMPORTANT:
This course provides education in cybersecurity techniques strictly for defensive purposes. All skills, tools, and methodologies taught (including vulnerability scanning, exploitation, password cracking, and network attacks) are intended to:

  • Strengthen cybersecurity defenses

  • Conduct authorized security assessments

  • Promote ethical hacking practices

Participants MUST agree to:

  1. Use these skills only in legal environments (e.g., owned labs, CTF platforms, or with explicit written permission).

  2. NEVER attack systems without formal authorization.

  3. Comply with all applicable laws (e.g., Computer Fraud and Abuse Act, GDPR, local cybersecurity regulations).

Unethical or unauthorized use of these techniques may result in:

  • Legal prosecution

  • Immediate course termination

  • Civil/criminal liability

By enrolling, you confirm understanding of these terms and accept full responsibility for your actions.

Short Version (For Emails/Quick Reference):

🔒 Ethical Use Only: Skills taught in this course are for authorized penetration testing and defensive cybersecurity. Unauthorized system access is illegal. Participants assume all legal responsibility for their actions.

Key Clauses to Include in Course Contracts:

  1. Authorization Requirement:
    "All hacking techniques must be practiced exclusively in controlled, self-owned environments or with documented third-party consent."

  2. Prohibited Actions:
    "Reverse engineering, malware deployment, or attacking public/private networks without authorization is strictly forbidden."

  3. Consequences:
    "Violators will be reported to authorities and face permanent removal from the course without refund."

  4. Industry Compliance:
    "Curriculum aligns with offensive security certifications (e.g., OSCP, CEH) and emphasizes compliance with EC-Council/OffSec ethical guidelines."

Where to Place This Notice:

  • Enrollment forms

  • Course syllabus (Page 1)

  • Lab access portals

  • Video introductions

  • Student certification agreements

Let me know if you need it adapted for a specific format (PDF, webpage, etc.). Always consult a legal professional for binding agreements.

 

 

5.0
1 review
Stars 5
1
Stars 4
0
Stars 3
0
Stars 2
0
Stars 1
0
Share
Certificate included
01- Introduction to Pentesting
02- Networking
03- Module 3 Bash Scripting
05- Module 5 Footprinting and Scanning
06- Module 6 Advanced Scanning Techniques
07- Module 7 Vulnerability Assessment
09- Module 9 Anonymity (Part 1 + part 2 ) Pivoting using Meterpreter
10- Module 10 System Attacks Password Attacks and Authentication Cracking