×
Events
Knowledgebase
Advanced Offensive Computer Security Training
Back To Courses
Module 1
4 Lessons
Getting Started with Kali 1-001
2 hr
BASH Scripting 1-002
2 hr
Netcat, the All-Powerful 1-003
2 hr
TCP/IP and Wireshark 1-004
2 hr
Module 2
8 Lessons
Information Gathering Techniques - Introduction 2-001
2 hr
Email Scraping 2-002
2 hr
Shodan 2-003
2 hr
Netcraft 2-004
2 hr
Information Gathering using DNS 2-005
2 hr
Information Gathering from SNMP 2-006
2 hr
Information Gathering using SMTP 2-007
2 hr
Information Gathering with Maltego 2-008
2 hr
Module 3
6 Lessons
Port Scanning 3-001
2 hr
Evading Firewalls and IDS 3-002
2 hr
Nmap Scripting Engine (NSE) 3-003
2 hr
Port Scanning 3-004
2 hr
Operating System (OS) Fingerprinting 3-005
2 hr
Port Scanning with Unicornscan 3-006
2 hr
Module 4
7 Lessons
ARPspoofing and MiTM 4-001
2 hr
MiTM with Ettercap 4-002
2 hr
DNS Spoofing with dnspoof 4-003
2 hr
Using MiTM with driftnet to View the Target's Images 4-004
2 hr
Using a MiTM attack to Spy on the Target 4-005
2 hr
Using Ettercap to Alter Messages/Packets 4-006
2 hr
MiTM attacks, Hijacking Software Updates 4-007
min
Module 5
3 Lessons
Buffer Overflow Exploitation 5-001
2 hr
Buffer Overflow Exploitation 5-002
2 hr
Buffer Overflow Exploitation, Fuzzing 5-003
2 hr
Module 6
3 Lessons
Exploit Development: Fuzzing with Spike 6-001
2 hr
Working with Exploits 6-002
2 hr
Working with Exploits: Using Exploit-DB to find Exploits 6-003
2 hr
Module 7
2 Lessons
Transferring Files, TFTP 7-001
2 hr
Transferring Files, hping3 7-002
2 hr
Module 8
4 Lessons
Metasploit, The Basics 8-001
2 hr
Metasploit, Exploiting Linux with Metasploit 8-002
2 hr
Metasploit, Hacking a Windows OS 8-003
2 hr
Metasploit, Post Exploitation 8-004
2 hr
This content is protected, please
Login
and enroll course to view this content!
Add to cart
Category:
Subcategory: