BEGIN:VCALENDAR
VERSION:2.0
METHOD:PUBLISH
CALSCALE:GREGORIAN
PRODID:-//WordPress - MECv7.32.0//EN
X-ORIGINAL-URL:https://www.infosec4tc.com/
X-WR-CALNAME:InfoSec4TC
X-WR-CALDESC:Cyber Security Career Courses
X-WR-TIMEZONE:Asia/Dubai
BEGIN:VTIMEZONE
TZID:Asia/Dubai
X-LIC-LOCATION:Asia/Dubai
BEGIN:STANDARD
TZOFFSETFROM:+0400
TZOFFSETTO:+0400
TZNAME:+04
DTSTART:20260520T161842
END:STANDARD
END:VTIMEZONE
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-PUBLISHED-TTL:PT1H
X-MS-OLK-FORCEINSPECTOROPEN:TRUE
BEGIN:VEVENT
CLASS:PUBLIC
UID:MEC-117bbe553a045edd211eaf6875dfa458@infosec4tc.com
DTSTART;TZID=Asia/Dubai:20230520T200000
DTEND;TZID=Asia/Dubai:20230520T220000
DTSTAMP:20230429T162538Z
CREATED:20230429
LAST-MODIFIED:20230511
PRIORITY:5
SEQUENCE:3
TRANSP:OPAQUE
SUMMARY:The RED Teaming Workshop for OSCP Exam
DESCRIPTION:*The Workshop Includes all LAB Licenses\nDuration: 15 weeks (two session per week)\nN. of Hours: 60 hours\nDate: 20 May 2023\n\n\n\nCourse Overview\n\n\nRead Teaming, Ethical Hacking (EH) and Penetration Testing are the most important and needed roles in the Cybersecurity world. Ethical hacking and Red Teaming without a doubt help the companies to be more secure as they play the same way malicious hackers Act and they always find loopholes inside of their systems, by doing so they help the companies be more secure against any possible cyber-attacks, all the other Cybersecurity fields are important however without the offensive Cybersecurity fields the companies are easily hackable.\n\n\nThe industry-leading Penetration Testing with Kali Linux (PWK/PEN-200) course introduces penetration testing methodologies, tools and techniques via hands-on experience and is self-paced. The OSCP is considered to be more technical than other ethical hacking certifications and is one of the few that requires evidence of practical penetration testing skills, this course will introduce red teaming technique to successfully conduct red teaming activity\n\n\n\nPrerequisites\n\n\nNo Prerequisites needed we will start from the beginning and take you to advanced level\n\n\n\nContent overview\n\n\n\nPenetration Testing: What You Should Know\nGetting Comfortable with Kali Linux\nCommand Line Fun\nPractical Tools\nBash Scripting\nPassive Information Gathering\nActive Information Gathering\nVulnerability Scanning\nWeb Application Attacks\nIntroduction to Buffer Overflows\nWindows Buffer Overflows\nLinux Buffer Overflows\nClient-Side Attacks\nLocating Public Exploits\nFixing Exploits\nFile Transfers\nAntivirus Evasion\nPrivilege Escalation\nPassword Attacks\nPort Redirection and Tunnelling\nActive Directory Attacks\nThe Metasploit Framework\nPowerShell Empire\nAssembling the Pieces: Penetration Test Breakdown\nTrying Harder: The Labs\n\n\n
URL:https://school.infosec4tc.com/p/the-complete-red-teaming-for-oscp1?coupon_code=GDHDDHD&product_id=4536029
ATTACH;FMTTYPE=image/jpeg:https://www.infosec4tc.com/wp-content/uploads/2023/01/red-team-w2.jpg
END:VEVENT
END:VCALENDAR
