Course Content
Introduction to Ethical Hacking and Penetration Testing
-
Introduction to Cybersecurity and Ethical Hacking
-
Overview of OSCP Certification
-
Penetration Testing Methodologies
-
Rules of Engagement (RoE) and Legal Compliance
-
Lab Environment Setup
Information Gathering and Reconnaissance
Vulnerability Scanning and Analysis
Exploitation Techniques
Post-Exploitation and Lateral Movement
Bypassing Security Mechanisms
Network Security and Exploitation
Web Application Penetration Testing
Active Directory Exploitation
Reporting and Documentation
Student Ratings & Reviews
No Review Yet