Offensive Security
Offensive Security focuses on identifying vulnerabilities in systems, networks,
and applications before attackers exploit them.
This course teaches ethical hacking techniques used by professional penetration
testers to test and strengthen the security posture of organizations.
Students will learn reconnaissance, vulnerability scanning, exploitation,
web application security, wireless hacking, and penetration testing techniques
used in real-world cybersecurity engagements.
4.8
90+ Learners
Advanced
3 Months
About this Course
Offensive Security professionals simulate cyber attacks to identify security
weaknesses before malicious hackers exploit them.
In this course, students will learn penetration testing methodologies used by
security professionals to evaluate and improve system security.
The training includes hands-on labs, real-world attack simulations, vulnerability
analysis, exploitation techniques, and ethical hacking tools used in the
cybersecurity industry.
Skills you'll gain
Ethical Hacking
Reconnaissance
Network Scanning
Vulnerability Assessment
Web Application Security
Password Cracking
Wireless Security Testing
Penetration Testing
Exploitation Techniques
Syllabus
- Cybersecurity attack landscape
- Types of hackers
- Ethical hacking methodology
- Legal and ethical considerations
- Information gathering techniques
- Open source intelligence (OSINT)
- Domain and DNS reconnaissance
- Target profiling
- Port scanning
- Network mapping
- Service enumeration
- Scanning tools and techniques
- User enumeration
- System enumeration
- Network share discovery
- Service identification
- Vulnerability scanning tools
- Risk assessment
- Security misconfigurations
- Vulnerability analysis
- Password cracking techniques
- Privilege escalation
- Maintaining access
- Covering tracks
- Types of malware
- Trojan attacks
- Malware analysis basics
- Malware defense strategies
- Packet sniffing
- Man in the middle attacks
- Network traffic analysis
- Defense techniques
- Common web vulnerabilities
- SQL injection
- Cross site scripting
- Web security testing
- Wireless encryption
- Wireless attacks
- WiFi penetration testing
- Wireless defense techniques
- Human-based attacks
- Phishing techniques
- Social engineering frameworks
- Defense strategies
- Penetration testing phases
- Exploitation techniques
- Reporting vulnerabilities
- Real-world attack simulations