Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Offensive Penetration Testing

via LinkedIn Learning

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Boost your skills as an ethical hacker to prepare for certifications such as the Offensive Security Certified Professional (OSCP) certification exam.

Syllabus

Introduction
  • Offensive penetration testing course overview
1. Setting the Foundation for Success
  • Understanding the penetration test report
  • Penetration test report demo
  • Note-taking and mind mapping
  • Finding resources to prepare for the offensive penetration testing
2. Kali Linux Basics
  • Setting up the Kali Linux VM
  • Overview of the tools in Kali Linux
  • Understanding the command line
  • Who, what, when, where, and how of the Linux command line
  • Windows command lab
  • Command line lab
  • Command line lab walkthrough
3. Understanding Network Protocols
  • Scanning network protocols
  • Scanning with Nmap
  • Scanning with MASSCAN
  • Scanning with Netcat
  • Using Wireshark
  • Wireshark and Encrypted Traffic
  • Weaponizing Wireshark
  • SMB enumeration
  • SMB enumeration demo
  • NFS enumeration
  • SMTP enumeration
  • SNMP enumeration
  • FTP enumeration
  • FTP enumeration demo
  • SSH enumeration
  • Protocol tips
  • Network Protocols Lab
4. Web Application Penetration Testing
  • Web application enumeration
  • Using intercepting proxies: Part 1
  • Using intercepting proxies: Part 2
  • SQL injections
  • SQL injection authentication bypass
  • Cross-Site Scripting (XSS)
  • BeEF demo
  • File inclusion vulnerabilities
  • File inclusion demo
  • File upload vulnerabilities
  • XXE attacks
  • Content management systems
  • Content management systems demo
  • Web application lab
  • Web application lab walkthrough
5. Introduction to Buffer Overflow
  • How to practice buffer overflows
  • Setting up the environment
  • Fuzzing the application
  • Finding bad characters
  • Finding the return address
  • Getting a shell
  • Buffer overflow lab
6. Public Exploits
  • Where to look for public exploits
  • Understanding the code
  • Modifying the code to fit the environment
  • Introduction to Metasploit
  • Using Metasploit or not
  • Public exploit lab
  • Public exploit lab walkthrough
7. Getting a Shell, Now What?
  • The different types of shells
  • How to upgrade a shell
  • Transferring files to and from Kali Linux
  • Transferring files demo
8. Privilege Escalation
  • Linux privilege escalation
  • Windows privilege escalation
  • A word on privilege escalation enumeration scripts
  • Privilege escalation lab
  • Privilege escalation walkthrough: Windows
  • Privilege escalation walkthrough: Linux
9. Password Cracking and Brute-Forcing Logins
  • Introduction to password cracking tools
  • Introduction to login brute-forcing tools
  • Password brute-forcing web logins
  • Password brute-forcing tips
  • Brute-force and password-cracking lab
  • Brute-force and password-cracking lab walkthrough
10. Putting It All Together
  • Hands-on penetration test lab
  • Hands-on penetration test lab walkthrough
  • Writing the report
11. Developing the Hacker Mindset
  • Understanding the hacker mindset
  • Tips on harnessing the hacker mindset

Taught by

Cybrary

Reviews

4.7 rating at LinkedIn Learning based on 72 ratings

Start your review of Offensive Penetration Testing

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.