Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Offensive Security Pathway
Before We Begin
PLEASE READ BEFORE STARTING
The Bigger Picture
Lesson 1 - Pentesting Methodologies & Frameworks
MITRE ATT&CK
OWASP
NIST 800-115
PTES
OSSTMM
ISSAF
Lesson 2 - Offensive Security Tools & Techniques
Ethical Hacking in Business Operations
Understanding Burp Suite
Understanding Hashcat
Port Scanning With Nmap
Discovering Site Assets
Performing OSINT Investigations On Company Employees
Path/ Directory Traversal
Finding & Exploiting XSS (0:19)
JavaScript Prototype Pollution
SQL Injection
Cross-Site Request Forgery (CSRF)
Code Injection
WordPress Hacking
Server-Side Request Forgery (SSRF)
YARA Rules
Discovering & Dehashing Hashed Values
Hacking API's
File Transfer
Lesson 3 - Security Assessment & Penetration Reporting
Matching Vulnerabilities to CVE's
Change Management Process During Pentesting Engagements
Production vs Test - Building Your Own Test Environment For Pentesting
Lets Have A Chat!
Career Coaching
Production vs Test - Building Your Own Test Environment For Pentesting
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock