• OSCP Roadmap
  • Introduction: Table of Contents
  • Online Courses
  • Security Books
  • Level 1 : EJPT
  • Level 2: ECPPT
    • Web Security
      • Web Pentesting Map
      • Web Application Attacks:
        • SQL
        • XSS
    • Network Security
      • Network Security Notes
      • Network Pentesting Map
        • Phase 1: Info Gathering
          • Whois
          • Google Dorks
          • MALTEGO
        • Phase 2: Scanning
          • NMAP
          • HPING
          • FPING
          • NETCAT
          • TELNET
          • FTP
          • WIRESHARK
          • DNS Enumeration
        • Phase 3: Enumeration
          • RECON-NG
          • NetBIOS Enumeration
          • SNMP Enumeration
        • Phase 4: Exploitation
          • NESSUS
          • METASPLOIT
          • AUTH CRACKERS
          • Sniffing Tools
        • Phase 5: Post Exploitation
          • METASPLOIT
          • AUTH CRACKERS
    • System Security
    • Wifi Security
    • Ruby & Metasploit
  • Level 3: OSCP
    • Reviews & Resources
  • HANDS-ON
    • CTFs (Online)
      • Tools
    • Practice Labs
Powered by GitBook

Online Courses

Online Courses

  • Volume I: The Complete Cyber Security Course by Nathan House | Intermediate Level

  • Volume II: The Complete Cyber Security Course by Nathan House | Intermediate Level

  • Volume III: The Complete Cyber Security Course by Nathan House | Intermediate Level

  • Volume IV: The Complete Cyber Security Course by Nathan House | Intermediate Level

  • System Security: Basic to advance level course by infySEC UK | Basic Level

  • Malware and Security course by infySEC UK | Intermediate Level

  • CompTIA Security + Courses by PluralSight | Basic Level

  • CompTIA Network + Courses by PluralSight | Basic Level

  • Web Application Penetration Testing Fundamentals by Mike Woolard | 90% Theory, 10% hands-on

  • Ethical Hacking: Hacking Web Applications by Troy Hunt | 100% Theory

results matching ""

    No results matching ""