Preparation for Offensive Security Certified Professional (OSCP)

The target audience for training
- Cybersecurity professionals wishing to acquire practical skills in penetration testing.
- System and network administrators who want to understand attack techniques.
- Developers looking to enhance the security of their applications.
- Anyone aspiring to a career in offensive security.
What you will learn
n preparation for Offensive Security Certified Professional (OSCP) certification, you will acquire solid, practical skills in penetration testing on real networks and systems. You will learn to identify, exploit and document vulnerabilities in various environments, using a methodical and rigorous approach. This course focuses on understanding the fundamentals of ethical hacking, developing a variety of exploitation techniques, and writing clear and professional reports. By mastering these skills, you will be able to conduct effective security audits and demonstrate your offensive security expertise in an internationally recognised way.
Training programme
- Duration: 5 days
Module 01: Introduction to cyber security
- Fundamental principles of information security.
- Threat actors and types of attack.
Module 02: Effective learning strategies
- Memorisation and time management techniques.
- Active learning methodologies.
Module 03: Writing reports for penetration testers
- Structure and content of a professional report.
- Documentation tools and best practice.
Module 04: Information gathering
- Passive collection techniques (OSINT).
- Active collection techniques (scans, enumerations).
Module 05: Vulnerability analysis
- Use of scanners such as Nessus and Nmap.
- Analysis and interpretation of results.
Module 06: Attacks on web applications
- Understanding OWASP Top 10 vulnerabilities.
- Exploitation of vulnerabilities such as XSS, LFI, RFI, etc.
Module 07: SQL injection
- Identification and exploitation of SQLi vulnerabilities.
- Use of automated tools and manual operation.
Module 08: Client-side attacks
- Creation of malicious documents (macros, shortcuts).
- Social engineering techniques.
Module 09: Use of public exploits
- Research and adaptation of existing exploits.
- Analysis and modification of exploit code.
Module 10: Antivirus evasion
- Techniques for bypassing antivirus solutions.
- Use of obfuscation and encryption tools.
Module 11: Password attacks
- Brute force, dictionaries and hash attacks.
- Use of tools such as Hydra and John the Ripper.
Module 12: Elevation of Windows privileges
- Identification of configuration flaws.
- Operation of services and scheduled tasks.
Module 13: Linux privilege elevation
- Exploiting SUID, sudo and configuration vulnerabilities.
- Use of automation scripts for enumeration.
Module 14: Port forwarding and SSH tunneling
- Pivoting techniques to access internal networks.
- Use of tools such as SSH, Socat and Chisel.
Module 15: Metasploit Framework
- Use of exploit modules, payloads and post-exploitation.
- Automation with scripts and customised resources.
Module 16: Active Directory
- Manual and automated enumeration with BloodHound.
- Attacks on authentication and lateral movements.
Module 17: Challenge laboratories
- Realistic scenarios to put acquired skills into practice.
- Environments simulating corporate networks.
Training objectives
- Mastering intrusion test methodologies and techniques in a real environment.
- Use Kali Linux tools effectively to identify and exploit vulnerabilities.
- Develop skills in elevating privileges on Windows and Linux systems.
- Writing professional penetration test reports.
- Preparing for and passing the OSCP certification exam.
Training prerequisites
- Basic knowledge of networks and operating systems (Windows and Linux).
- Familiarity with the command line and scripts.
- Understanding the fundamental concepts of cybersecurity.
- No prior certification required, but IT experience is recommended.
- Level : Intermediary
- Certification body : ACG CYBERACADEMY
- Certification: Yes
- Accessibility : Yes
- Duration: 5 days
Important information:
Our courses are not registered with the Répertoire National des Certifications Professionnelles (RNCP), but they do comply with the requirements of the Répertoire Spécifique (RS).