HOME > IT & Software > Offensive Cyber Operations

Offensive Cyber Operations

SynopsisOffensive Cyber Operations, available at $19.99, has an avera...
Offensive Cyber Operations  No.1

Offensive Cyber Operations, available at $19.99, has an average rating of 4.38, with 50 lectures, based on 8 reviews, and has 144 subscribers.

You will learn about Python and Bash fundamentals Python TCP and UDP sockets Writing WiFi Pentesting tools using RAW Sockets Writing Python Backdoor and manage its sessions Linux Binary Socket Exploitation Backdooring PE and creating a Decryption routine in Assembly This course is ideal for individuals who are Cyber security students, Security developers, Security Analysts It is particularly useful for Cyber security students, Security developers, Security Analysts.

Enroll now: Offensive Cyber Operations

Summary

Title: Offensive Cyber Operations

Price: $19.99

Average Rating: 4.38

Number of Lectures: 50

Number of Published Lectures: 50

Number of Curriculum Items: 50

Number of Published Curriculum Objects: 50

Original Price: $19.99

Quality Status: approved

Status: Live

What You Will Learn

  • Python and Bash fundamentals
  • Python TCP and UDP sockets
  • Writing WiFi Pentesting tools using RAW Sockets
  • Writing Python Backdoor and manage its sessions
  • Linux Binary Socket Exploitation
  • Backdooring PE and creating a Decryption routine in Assembly
  • Who Should Attend

  • Cyber security students, Security developers, Security Analysts
  • Target Audiences

  • Cyber security students, Security developers, Security Analysts
  • This course is 100% hands on for security developers or anyone interested in offensive security. In this course you will be able to create your own custom backdoor using python and control its sessions. You will also learn how to write Wifi pentesting tools with raw sockets. A hands on binary exploitation and backdooring PE is also covered.

    Course Curriculum

    Chapter 1: Linux Command Line Fundamentals

    Lecture 1: Linux Filesystem Heirarchy

    Lecture 2: Linux which command

    Lecture 3: Linux locate command

    Lecture 4: Linux Netcat essentials

    Lecture 5: Linux find command

    Lecture 6: Linux grep command

    Lecture 7: Linux apt command

    Lecture 8: Linux manage services

    Lecture 9: Linux environment variables

    Lecture 10: Linux redirection and piping

    Lecture 11: Linux Awk and cut and manage processes

    Chapter 2: Bash scripting fundamentals

    Lecture 1: Bash scripting variables

    Lecture 2: Bash scripting read user input

    Lecture 3: Bash scripting if statement

    Lecture 4: Bash scripting for loops

    Lecture 5: Bash scripting while loops and reading files

    Chapter 3: Python scripting fundamentals

    Lecture 1: Python data types

    Lecture 2: Python string manipulation

    Lecture 3: Python lists

    Lecture 4: Python loops

    Lecture 5: Python functions

    Lecture 6: Python try-except

    Chapter 4: Create Python custom backdoor

    Lecture 1: Python udp socket

    Lecture 2: Python tcp socket

    Lecture 3: Python multithreaded socket

    Lecture 4: Python manage sessions

    Lecture 5: Python subprocess module

    Lecture 6: Python inject shellcode into a running process

    Lecture 7: Python LasPlagas backdoor demo

    Chapter 5: Create WiFi tools using raw sockets in Python

    Lecture 1: Python WiFi – basics

    Lecture 2: Python WiFi – Wireshark basics

    Lecture 3: Python WiFi – scan access points with scapy

    Lecture 4: Python WiFi – scan access points with raw socket

    Lecture 5: Python WiFi – detect connected clients with raw sockets

    Lecture 6: Python WiFi – channel hopping

    Lecture 7: Python WiFi – send deauthentication frame with raw socket

    Chapter 6: Man in The Middle Attacks

    Lecture 1: Bettercap – SSLStrip Attack

    Lecture 2: Bettercap – File Replace Plugin

    Lecture 3: Bettercap – Beef-XSS Attack

    Lecture 4: ShellCloak and Beef-XSS

    Chapter 7: Linux X86 Binary Exploitation

    Lecture 1: X86 Architecture Fundamentals

    Lecture 2: X86 Assembly – Calling function

    Lecture 3: X86 Assembly – stack frames

    Lecture 4: Buffer Overflow Part1

    Lecture 5: Buffer Overflow Part2

    Lecture 6: Buffer Overflow Part3

    Lecture 7: Buffer Overflow – Brute force ASLR

    Chapter 8: Backdooring PE

    Lecture 1: Backdooring PE – Basics

    Lecture 2: Backdooring PE with Code Caving

    Lecture 3: Backdooring PE – Encrypt and Decrypt shellcode

    Instructors

  • Offensive Cyber Operations  No.2
    Tarek Abdelmotaleb
    Offensive Security Researcher and Developer
  • Rating Distribution

  • 1 stars: 0 votes
  • 2 stars: 0 votes
  • 3 stars: 2 votes
  • 4 stars: 2 votes
  • 5 stars: 4 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!