Course Details

Request Free Demo

OSEP PEN 300 Certification Training: Overview

Pursuing the Offensive Security PEN-300 course can give you complete clarity on various concepts related to evasion techniques and breaching defenses. This is an advanced penetration testing certification that paves the way for better career opportunities. We have the best in-house team of experts and faculty to support you throughout the course. Our program provides a thorough understanding of topics including techniques and tactics in Kali Linux penetration testing, customized security functions for growing enterprises, and more. The best part of enrolling with us is that the course is tailored to your convenience and specific needs. It can help you prepare for the OSEP PEN-300 certification and pass it on your first attempt.

OSEP Course Price

OSEP Modules

Module 01: Evasion Techniques and Breaching Defenses: General Course Information
  • About The PEN-300 Course
  • Provided Material
  • Overall Strategies for Approaching the Course
  • About the PEN-300 VPN Labs
  • About the OSEP Exa
Module 02: Operating System and Programming Theory
  • Programming Theory
  • Windows Concepts
Module 03: Client Side Code Execution With Office
  • Will You Be My Dropper
  • Phishing with Microsoft Office
  • Keeping Up Appearances
  • Executing Shellcode in Word Memory
  • PowerShell Shellcode Runner
  • Keep That PowerShell in Memory
  • Talking To The Proxy
Module 04: Client Side Code Execution With Windows Script Host
  • Creating a Basic Dropper in Jscript
  • Jscript and C#
  • In-memory PowerShell Revisited
Module 05: Process Injection and Migration
  • Finding a Home for Our Shellcode
  • DLL Injection
  • Reflective DLL Injection
  • Process Hollowing
Module 06: Introduction to Antivirus Evasion
  • Antivirus Software Overview
  • Simulating the Target Environment
  • Locating Signatures in Files
  • Bypassing Antivirus with Metasploit
  • Bypassing Antivirus with C#
  • Messing with Our Behavior
  • Office Please Bypass Antivirus
  • Hiding PowerShell Inside VBA
Module 07: Advanced Antivirus Evasion
  • Intel Architecture and Windows 10
  • Antimalware Scan Interface
  • Bypassing AMSI With Reflection in PowerShell
  • Wrecking AMSI in PowerShell
  • UAC Bypass vs Microsoft Defender
  • Bypassing AMSI in JScript
Module 08: Application Whitelisting
  • Application Whitelisting Theory and Setup
  • Basic Bypasses
  • Bypassing AppLocker with PowerShell
  • Bypassing AppLocker with C#
  • Bypassing AppLocker with JScript
Module 09: Bypassing Network Filters
  • DNS Filters
  • Web Proxies
  • IDS and IPS Sensors
  • Full Packet Capture Devices
  • HTTPS Inspection
  • Domain Fronting
  • DNS Tunneling
Module 10: Linux Post-Exploitation
  • User Configuration Files
  • Bypassing AV
  • Shared Libraries
Module 11: Kiosk Breakouts
  • Kiosk Enumeration
  • Command Execution
  • Post-Exploitation
  • Privilege Escalation
  • Windows Kiosk Breakout Techniques
Module 12: Windows Credentials
  • Local Windows Credentials
  • Access Tokens
  • Kerberos and Domain Credentials
  • Processing Credentials Offline
Module 13: Windows Lateral Movement
  • Remote Desktop Protocol
  • Fileless Lateral Movement
Module 14: Linux Lateral Movement
  • Lateral Movement with SSH
  • DevOps
  • Kerberos on Linux
Module 15: Microsoft SQL Attacks
  • MS SQL in Active Directory
  • MS-SQL Escalation
  • Linked SQL Servers
Module 16: Active Directory Exploitation
  • AD Object Security Permissions
  • Kerberos Delegation
  • Active Directory Forest Theory
  • Burning Down the Forest
  • Going Beyond the Forest
  • Compromising an Additional Forest
Module 17: Combining the Pieces
  • Enumeration and Shell
  • Attacking Delegation
  • Owning the Domain
Module 18: Trying Harder: The Labs
  • Real Life Simulations

Choose Your Preferred Learning Mode

1 on 1 Training

Get personalized, instructor-led cybersecurity training tailored to your learning pace and goals.

Online Live Training

Learn cybersecurity in real-time with expert trainers through interactive online sessions.

Corporate Training

Upskill your team with customized cybersecurity training designed for businesses and organizations.

Who should do OSEP Certification Training?

●  Infosec working experts thinking of a changeover into penetration testing.
●  Pentesters watching an industry-leading certification for career growth.
●  Security professionals.
●  Network administrators.
●  Other technology professionals

OSEP Certification Training Prerequisites

All students are required to have the following:
●  Solid understanding of TCP/IP networking
●  Reasonable Windows and Linux administration experience
●  Familiarity with basic Bash and/or Python scripting

Subscribe Our Newsletter

Stay updated on special discounts, new courses, and latest cybersecurity trends

Copyright © 2024. All rights reserved