logo
Offensive Security – PEN-200: Penetration Testing with Kali Linux 2024-11

Offensive Security – PEN-200: Penetration Testing with Kali Linux 2024-11

Published on: 2024-12-20 07:27:53

Categories: 28

Share:

Descriptions

The industry-leading Penetration Testing with Kali Linux (PWK/PEN-200) course introduces penetration testing methodologies, tools and techniques via hands-on experience and is self-paced. Students who complete the course and pass the exam will earn the Offensive Security Certified Professional (OSCP) certification which requires holders to successfully attack and penetrate various live machines in a safe lab environment. The OSCP is considered to be more technical than other ethical hacking certifications and is one of the few that requires evidence of practical penetration testing skills.

What you’ll learn

Who this course is for

Specificatoin of PEN-200: Penetration Testing with Kali Linux

Content of PEN-200: Penetration Testing with Kali Linux

01. Vulnerability Scanning
02. Introduction to Web Application Attacks
03. Common Web Application Attacks
04. SQL Injection Attacks
05. Client-side Attacks
06. Locating Public Exploits
07. Information Gathering
08. Fixing Exploits
09. Antivirus Evasion
10. Password Attacks
11. Windows Privilege Escalation
12. Linux Privilege Escalation
13. Port Redirection and SSH Tunneling
14. Tunneling Through Deep Packet Inspection
15. The Metasploit Framework
16. Active Directory Introduction and Enumeration
17. Attacking Active Directory Authentication
18. Lateral Movement in Active Directory
19. Assembling the Pieces

Requirements

Pictures

PEN-200: Penetration Testing with Kali Linux

Sample Clip

Installation Guide

Extract the files and watch with your favorite player

Subtitle : Not Available

Quality: 720p

The 2024/11 version has an additional 1 hour of duration compared to the 2020/11 version.

Download Links

Download Part 1 – 1 GB

Download Part 2 – 1 GB

Download Part 3 – 0.98 GB

Password file(s): www.abc.com

File size

2.98 GB

Sharing is caring:

Leave a Comment (Please sign to comment)