Skocz do zawartości

Aktywacja nowych użytkowników
Zakazane produkcje

  • advertisement_alt
  • advertisement_alt
  • advertisement_alt
Courses2024

Udemy - Offensive Security Pathway - Level 2 Of 6

Rekomendowane odpowiedzi

7425f2ebdb4e420ec0482f45c66694dd.avif
Free Download Udemy - Offensive Security Pathway - Level 2 Of 6
Published: 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.01 GB | Duration: 7h 24m
Offensive Security Officer (OSO) - Dive deeper into Intermediate Offensive Security Concepts

What you'll learn
Understand virtualization tools like VMware, VirtualBox, and Hyper-V for building isolated test environments.
Gain intermediate Windows and Linux knowledge, focusing on system configurations and vulnerabilities.
Deepen your understanding of networking concepts, including VLANs, firewalls, and packet analysis.
Learn to analyze network protocols and traffic using tools like Wireshark.
Master the use of command-line interfaces like PowerShell (Windows) and Bash (Linux) for system control and automation.
Explore basic scripting with Bash, PowerShell, and Python to automate offensive security tasks.
Discover OSINT (Open-Source Intelligence) techniques for gathering useful information from public sources.
Get an introduction to social engineering tactics, including phishing and spear-phishing.
Learn defensive techniques to recognize and prevent social engineering attacks.
And more.
Requirements
Beginner. It is recommended to have Level 1 knowledge or at least basic computer skills.
Description
In this Level 2 course, Offensive Security Officer (OSO), you'll take the next step in your cybersecurity journey by diving deeper into intermediate offensive security concepts. You will explore the importance of virtualization tools like VMware, VirtualBox, and Hyper-V for safely testing exploits and techniques in isolated environments. You'll also enhance your skills in both Windows and Linux operating systems, focusing on user management, system configurations, and identifying common vulnerabilities.On the networking side, you'll delve into DNS, firewalls, and packet analysis, gaining hands-on experience with network protocols like TCP, UDP, and ICMP using tools like Wireshark. You'll also become more proficient in using command-line interfaces such as PowerShell and Bash for controlling systems and automating processes with basic scripting in Bash, PowerShell, and Python.Additionally, this course introduces you to OSINT, teaching you how to gather valuable information from public sources. You'll explore social engineering techniques-phishing, spear-phishing, and pretexting-and learn to defend against these attacks by recognizing key tactics.This chapter is ideal for those with a foundational knowledge in offensive security who are ready to take their skills to the next level, learning to combine technical expertise with social engineering insights.SyllabusVirtualization Basics: Introduction to tools like VMware, VirtualBox, and Hyper-V, and their importance in creating safe and isolated environments for testing.Windows Medium Knowledge: Intermediate Windows OS knowledge including user management, system configurations, and common Windows vulnerabilities.Linux Medium Knowledge: Intermediate-level understanding of Linux commands, services, and configurations.Networking Medium Knowledge: Further exploration into networking concepts, covering VLANs, firewalls, and basic packet analysis.Network Protocols & Packet Analysis: Understanding network protocols (e.g., TCP, UDP, ICMP) and using tools like Wireshark for packet analysis.Command Line Interfaces: In-depth exploration of command-line tools like PowerShell (Windows) and Bash (Linux) for system control and automation.Basic Scripting for Automation: Introduction to scripting languages like Bash, PowerShell, and Python to automate tasks and manage systems efficiently.OSINT: Learn what usable information is out there in the public and how to find it.Introduction to Social Engineering: Basics of social engineering, including phishing, spear-phishing, and pretexting, to manipulate individuals into revealing information or credentials.Social Engineering Defense Techniques: How to recognize and defend against social engineering attacks from an offensive perspective.
Overview
Section 1: Introductie
Lecture 1 2.1 Intro
Lecture 2 2.2 Windows Medium Knowledge
Lecture 3 2.3 Linux Medium Knowledge
Lecture 4 2.4 Networking Medium Knowledge
Lecture 5 2.5 Network Packet Analysis
Lecture 6 2.6 Basic Scripting in Python
Lecture 7 2.7 OSINT
Lecture 8 2.8 Social Engineering
Lecture 9 2.9 Wrapping Up
Aspiring penetration testers who want to advance their skills.,IT professionals looking to gain practical offensive security knowledge.,Students interested in improving their understanding of system vulnerabilities and defenses.,Cybersecurity enthusiasts eager to master intermediate networking and scripting concepts.,Anyone interested in social engineering from both offensive and defensive perspectives.
Homepage:
https://www.udemy.com/course/offensive-security-pathway-level-2-of-6/


Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.

No Password - Links are Interchangeable

Udostępnij tę odpowiedź


Odnośnik do odpowiedzi
Udostępnij na innych stronach

Dołącz do dyskusji

Możesz dodać zawartość już teraz a zarejestrować się później. Jeśli posiadasz już konto, zaloguj się aby dodać zawartość za jego pomocą.

Gość
Dodaj odpowiedź do tematu...

×   Wklejono zawartość z formatowaniem.   Usuń formatowanie

  Dozwolonych jest tylko 75 emoji.

×   Odnośnik został automatycznie osadzony.   Przywróć wyświetlanie jako odnośnik

×   Przywrócono poprzednią zawartość.   Wyczyść edytor

×   Nie możesz bezpośrednio wkleić grafiki. Dodaj lub załącz grafiki z adresu URL.

    • 1 Posts
    • 7 Views
    • 1 Posts
    • 6 Views
    • 1 Posts
    • 7 Views
    • 1 Posts
    • 7 Views
    • 1 Posts
    • 7 Views

×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Korzystając z tej witryny, wyrażasz zgodę na nasze Warunki użytkowania.