As a pentester, you need to understand the methods of real-life attackers and use the tools, techniques, and resources they exploit. Join ethical hacker Clint Kehr as he guides you from basic hacking concepts to advanced exploitation techniques in this Offensive Penetration Testing Course. Develop the hacker mindset or hone your existing skills.
Learning Objectives
The Offensive Penetration Testing course can help students prepare for penetration testing oriented exams like the CEH and the OSCP. Students will learn to identify vulnerabilities and use exploits to test the defenses of your information systems, and other penetration testing. By the end of this course, students should be able to:
- Use passive and active reconnaissance techniques
- Use basic and advanced scanning and information harvesting techniques
- Create code to exploit vulnerabilities
- Use and modify public exploits
- Recognize legit public exploits from fake exploits
- Use several techniques to gain access to a system from both remote and local side
- Use several techniques to escalate privileges
- Clear your tracks
- Create executive reports so your pentesting results can be presented to management.
- Perform lateral and vertical jumps between systems
- Use tunnels to compromise other computers on the network or hide your traffic.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Exploitation Analysis
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.