Offensive Security Pathway - Level 1 Of 6
Published 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 5.75 GB | Duration: 9h 28m
Published 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 5.75 GB | Duration: 9h 28m
Offensive Security Recruit (OSR) - Your starting point in the world of Offensive Security!
What you'll learn
Understand the fundamentals of Offensive Security and its role in cybersecurity.
Grasp key cybersecurity concepts such as the CIA triad (Confidentiality, Integrity, Availability).
Explore job opportunities in offensive security, from penetration testing to red teaming.
Learn legal and ethical hacking practices to responsibly assess vulnerabilities.
Set up a hands-on demo lab with an Active Directory environment, clients, and an attacker machine.
Gain foundational knowledge in Windows, Linux, and networking basics.
Introduction to cryptography principles like encryption and hashing.
Get introduced to scripting languages and their role in automation for offensive security tasks.
And more…
Requirements
No prior skills required—we start from the basics and gradually build up. Level 1 is perfect for students who are completely new to computers and ethical hacking.
Description
This Level 1 course, Offensive Security Recruit (OSR), is designed for beginners eager to dive into the world of ethical hacking and offensive security. No technical computer skills are required!Through this course, you will discover what offensive security is, why it's crucial in today’s cybersecurity landscape, and the potential career paths it offers, from penetration tester to red team operator.You’ll explore essential cybersecurity concepts such as confidentiality, integrity, and availability (CIA), while also understanding the legal and ethical implications of ethical hacking. In addition, the course provides hands-on guidance in setting up a practical demo lab environment that mimics real-world scenarios, complete with an Active Directory and attacker machine.Participants will develop foundational skills in Windows, Linux, and networking concepts, ensuring you're equipped to tackle more advanced topics in subsequent levels. Additionally, you’ll get introduced to scripting and cryptography, key components in automation and secure communications.Whether you're starting your cybersecurity journey or transitioning from another non-IT field, this course provides the perfect foundation to launch your career in offensive security.SyllabusWhat is "Offensive Security": Overview of offensive security practices and their importance in cybersecurity.Introduction to Cybersecurity Concepts: Basic security terminologies like CIA (Confidentiality, Integrity, Availability) and threat actors.What are the job opportunities in Offensive Security?: Explore potential career paths, from penetration tester to red team operator.Legal & Ethical Hacking Practices: Highlighting the importance of ethical hacking, legal boundaries, and reporting vulnerabilities.Things you absolutely need to know before starting your journey: Crucial prerequisites and knowledge needed before diving into offensive security.Interested: Let's get up-and-running.Install Demo Lab: 1x AD - 2 Clients - Attacker Machine - Demodata - Azure environment.Next steps: Guidance on CTF (Capture The Flag) platforms and what to expect in the following courses.Windows Basics: Understanding the core features and structure of Windows OS.Linux Basics: Introduction to the Linux operating system, core features and structure of Windows OS Networking Basics: Essential networking concepts such as IP addressing, subnets, protocols (TCP/IP, UDP), and basic routing.Introduction to Cryptography: Basic cryptographic concepts like encryption, hashing, and digital signatures.What is scripting?: Explanation of scripting languages and how they can be used for automation in offensive security.
Overview
Section 1: Introductie
Lecture 1 1.1 Intro
Lecture 2 1.2 Intro + What Can You Expect
Lecture 3 1.3 Offensive Security Introduction
Lecture 4 1.4 Next Steps in Learning - Computers
Lecture 5 1.5 Next Steps in Learning - Windows
Lecture 6 1.6 Next Steps in Learning - Linux
Lecture 7 1.7 Next Steps in Learning - Networking
Lecture 8 1.8 Next Steps in Learning - Cryptography
Lecture 9 1.9 Shell Commands and Scripting
Lecture 10 1.10 Virtualization and Cloud Basics
Lecture 11 1.11 Installing Demo Lab Environment
Lecture 12 1.12 Demo Lab Virtual Box Networks
Lecture 13 1.13 Setup Kali Linux Machine
Lecture 14 1.14 Setup Win10 & Win11 Clients + CommandoVM
Lecture 15 1.15 bWAPP Install
Lecture 16 1.16 pfSense Install
Lecture 17 1.17 Install Metasploitable
Lecture 18 1.18 DC01 Installation
Lecture 19 1.19 Install IIS - SQL Server
Lecture 20 1.20 Install Windows Client
Lecture 21 1.21 Outro
Beginners curious about cybersecurity and ethical hacking (no technical computer skills required).,IT professionals wanting to explore offensive security concepts.,Students interested in exploring a career in ethical hacking or red teaming.,Cybersecurity enthusiasts seeking a structured starting point to build practical skills.,Everybody who wants to start a career in offensive cybersecurity but do not know where to start.