Offensive Security Advanced
This Course is for the beginners, who have fundamental knowledge of Information Technology. Its is the Offensive Security Basic Course.
Trainer
Course Fee
35000 TAKA
Duration
60 Hours
Class Duration
2:30 Hour
Number Of Class
24 Classes
Number Of Seats
10-15
Prerequisite: Knowledge: Operating System, Networking and Programming.
In the case of physical courses, Attendees have to bring their laptops.
NB: In the case of online courses, we will arrange one discussion session every week in which attendees have to come physically.
Privilege Escalation
Privilege Escalation
Discussion Topics: Information Gathering, Windows Privilege Escalation Examples, Linux Privilege Escalation Examples.
Password Attacks
Password Attacks
Discussion Topics: Wordlists, Brute Force Wordlists, Common Network Service Attack Methods, Leveraging Password Hashes.
Port Redirection and Tunnelling
Port Redirection and Tunnelling
Discussion Topics: Port Forwarding, SSH Tunnelling, PLINK.exe, NETSH, HTTP Tunneling Through Deep Packet Inspection.
Active Directory Attacks
Active Directory Attacks
Discussion Topics: Active Directory Theory, Active Directory Enumeration, Active Directory Authentication, Active Directory Lateral Movement, Active Directory Persistence.
The Metasploit Framework
The Metasploit Framework
Discussion Topics: Metasploit User Interfaces and Setup, Exploit Modules, Metasploit Payloads, Building Our Own MSF Module, Post-Exploitation with Metasploit, Metasploit Automation.
PowerShell Empire
PowerShell Empire
Discussion Topics: Installation, Setup, and Usage, PowerShell Modules.
Assembling the Pieces: Penetration Test Breakdown
Assembling the Pieces: Penetration Test Breakdown
Discussion Topics: Public Network Enumeration, Targeting the Web Application, Targeting the Database, Deeper Enumeration of the Web Application Server, Targeting the Database Again, Targeting Poultry, Internal Network Enumeration, Targeting the Jenkins Server, Targeting the Domain Controller.
Trying Harder: The Labs
Trying Harder: The Labs
Discussion Topics: Real Life Simulations, Machine Dependencies, Cloned Lab Machines, Unlocking Networks, Routing, Machine Ordering & Attack Vectors, Firewall / Routers / NAT, Passwords.