05 Offensive Computing Introduction

Course Description

If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself,you will succumb in every battle.

-Sun Tzu (The Art of War)

To learn how to defend computing resources, it is essential to first thoroughly understand the enemy. In order to do so, you must develop a formidable skill in offensive computing. Learning to attack networks, programs, computer systems and exploit vulnerabilities is the objective of this course. This course will take a student through the basics of offensive computing – from setting up a virtual laboratory for practise, to installing the right operating systems, tools and more. Although labelled as a beginner course, this student will arm the student with a sharp skillset in offensive computing.

Who is this course for?

  • Cybersecurity professionals
  • Penetration testers
  • White hat hackers
  • IT professionals 
  • Cybersecurity auditors

course stats

Pre-requisites 

Basics of operating systems and networking.

  • Basic computer knowledge (operating system, e-mail, browsing)
  • Linux 101
  • Networking concepts

Computer with the following requirements

  • At least one of the following operating systems installed(If more than one is installed then no problem):
    • Windows
    • Linux
    • Mac OS X
  • Active broadband internet connection
  • RAM : Min 8GB, Preferred 16GB
  • 50GB Free hard disk Space
  • Suggested Hardware : 2 monitors (one for your exercises, and one to keep this course window open). A single monitor will work fine just as well.
  • For the WiFi chapter, you will need a WiFi card capable of monitor mode and packet injection such as the Alfa-AWUS036NHA

What you will learn

Offensive computing Introduction Types of hackers

  • Types of hackers
  • Types of hacks
  • Reasons behind the hack
  • Technical Exploits
  • Social Engineering
  • Physical Penetration
  • Malware
  • The necessity of offense for a defender
  • The Penetration test

Familiarity with the toolset

  • Linux commands you’ll use as a security professional
  • Installing Kali Linux
  • Getting to know Kali
  • Setting up a Virtual Lab

OSINT

  • Open Source Intelligence
  • Information Gathering/li>
  • Domain Profiling
  • Maltego
  • Scraping the internet
  • DNS Enumeration
  • Google Hacking
  • Recon-ng
  • Netcraft
  • Metadata
  • Threat Intelligence

The Network

  • Ports, Addresses and Sockets
  • Netcat
  • Mapping the Network
  • Sniffing packets
  • Interacting with services

Networking & Firewalls

  • Understanding Firewalls
  • Bypassing firewall restrictions during attacks
  • Shells and Reverse shells
  • The reason behind beaconing

Networking & Firewalls

  • Understanding Firewalls
  • Bypassing firewall restrictions during attacks
  • Shells and Reverse shells
  • The reason behind beaconing

Exploits and Vulnerabilities

  • The anatomy of an exploit
  • Where to look for exploits
  • Vulnerabilities
  • Vulnerability Scanning
  • Matching an exploit to a vulnerability
  • Modifying exploit code
  • Client side exploits

Social Engineering

  • Integrating OSINT
  • Harvesting credentials through fake websites
  • Spoofing emails
  • Phishing kits
  • DNS based attacks
  • Sock puppet profiles
  • The wayback machine
  • WiFi AP spoofing

Metasploit Framework

  • Introduction
  • The MSF DB
  • Reconaissance modules
  • Searching for exploits
  • Generating exploit code
  • Launching exploits
  • Creating a Handler
  • Automating and Scripting
  • Creating a basic dropper
  • Creating malicious payloads

Password Cracking

  • Introduction to encryption and hashes
  • Brute force
  • Hashcat
  • Types of hashes
  • Masked password attacks
  • Dictionary attacks
  • Hybrid attacks
  • Password cracking hardware
  • Cloud GPU rigs
  • Brute force on the network

Reporting your findings

  • Integrating OSINT
  • Documentation on findings
  • Writing a report
  • Visualisations
  • Types of reports

Professional prospects

This course stands as a foundation course for the following professional applications. 

  • Penetration tester
  • Security auditor
  • Software developer – Security
  • Cybersecurity Specialist
  • Cloud Engineer
  • White hat hacker
Current Status
Not Enrolled
Price
Closed
Get Started
This course is currently closed

This course includes :

Questions before purchasing this course?

No worries, Send us a quick message and we will be happy to answer any questions you have.