Course Details
Details : OSCP
Description
Offensive Security Certified Professional (OSCP) is a certification program that focuses on hands-on
information security skills. It consists of two parts: a nearly 24-hour pen testing exam, and a document
report due 24 hours after it. OSCP is a very hands-on exam.
Before you can take the OSCP exam, you are required to take the Penetration Testing with Kali (PWK
Taking the course is mandatory for you to become eligible to take the OSCP. In addition to the knowle
gain from the course, it opens doors to several career opportunities in information security.
✓ What will you learn?
✓ Use multiple information gathering techniques to identify and enumerate targets running various
systems and services.
✓ Write basic scripts and tools to aid in the penetration testing process.
✓ Analyze, correct, modify, cross-compile, and port public exploit code.
Successfully conduct both remote and client-side attacks.
✓ Identify and exploit XSS, SQL injection, and file inclusion vulnerabilities in web applications.
Deploy tunneling techniques to bypass firewalls.
Related Courses
CCNP SECURITY
CCNA CYPER OPS
FIREWALL (NSE4)
LINUX
AZURE
MCSE
MCSA
OSCP
CCNP
CCNA VOICE
Description
Offensive Security Certified Professional (OSCP) is a certification program that focuses on hands-on
information security skills. It consists of two parts: a nearly 24-hour pen testing exam, and a document
report due 24 hours after it. OSCP is a very hands-on exam.
Before you can take the OSCP exam, you are required to take the Penetration Testing with Kali (PWK
Taking the course is mandatory for you to become eligible to take the OSCP. In addition to the knowle
gain from the course, it opens doors to several career opportunities in information security.
✓ What will you learn?
✓ Use multiple information gathering techniques to identify and enumerate targets running various
systems and services.
✓ Write basic scripts and tools to aid in the penetration testing process.
✓ Analyze, correct, modify, cross-compile, and port public exploit code.
Successfully conduct both remote and client-side attacks.
✓ Identify and exploit XSS, SQL injection, and file inclusion vulnerabilities in web applications.
Deploy tunneling techniques to bypass firewalls.