# OSCP > Join Edoxi’s 30-Hour OSCP Course in Dubai to build advanced penetration testing, cyberkill chain methodology, and ethical hacking strategies. Enrol Now! ## Course Details - Rating: 4.9/5 (150 reviews) - Location: Dubai, UAE - Category: Cyber Security - Sub-Category: Offensive Security ## Course Introduction Edoxi’s 30-Hour Offensive Security Certified Professional (OSCP) certification course in Dubai builds advanced penetration testing, cyberkill chain methodology, and ethical hacking strategies. Participants engage in real-world exploitation, privilege escalation, and post-exploitation tactics. Get trained in dedicated lab environments that simulate real-world cybersecurity threats. Expert instructors prepare you for the OSCP Certification exam. Enrol now and become a sought-after Offensive Security Certified Professional in Dubai’s cybersecurity market. ## What Do You Learn from Edoxi's OSCP Certification Course in Dubai **Advanced Penetration Testing Methodology** Apply Cyber Kill Chain strategies to identify, exploit, and document vulnerabilities in multi-layered network environments. **Enterprise Network Exploitation** Master Active Directory attacks, LDAP enumeration, and privilege escalation for full network compromise in Windows and Linux environments. **Web Application Security Assessment** Perform SQL injection, XSS, authentication bypass, and exploit business logic vulnerabilities using Burp Suite. **Network Security & Attack Vectors** Gain expertise in network scanning, firewall evasion, IDS/IPS bypass, and advanced post-exploitation tactics with Nmap and Metasploit. **Advanced Shell Exploitation** Develop reverse shells, SSH tunneling, payload obfuscation, and file transfer techniques for stealthy penetration testing. **Professional Penetration Testing Documentation** Craft a detailed security report, aligning with industry standards for compliance, risk analysis, and mitigation strategies. ## Key Features of Edoxi's Offensive Security Certified Professional Course in Dubai **Advanced Exploitation & Attack Labs** Simulate real-world penetration testing in environments with unpatched systems, hardened networks, and enterprise attack surfaces. **Industry-Leading Offensive Security Tools** Hands-on experience with Metasploit, Burp Suite, Nmap, Hydra, Nikto, Netcat, and Wireshark, including custom Python/Bash scripting. **Realistic Adversary Simulations** Execute structured attack scenarios, refining exploitation techniques, lateral movement, and persistence mechanisms. **Comprehensive OSCP Study Resources** Access official OSCP e-books, command cheat sheets, exam preparation guides, and penetration testing mind maps. **Interactive Red Team Workshops** Develop expertise in privilege escalation, lateral movement, evasion tactics, and security bypass techniques. **Intensive OSCP Exam Readiness Program** Follow a structured study plan with time management strategies, exploit chaining methodologies, and reporting frameworks. ## Who Can Join Our OSCP Course in Dubai? **Offensive Security & Penetration Testers** Master exploit development, post-exploitation, and adversary simulation techniques. **Cyber Threat Analysts & SOC Professionals** Enhance threat detection, vulnerability assessment, and incident response capabilities. **IT & System Security Administrators** Strengthen enterprise security postures by understanding adversary tactics, techniques, and procedures (TTPs). **Network Security Engineers** Gain firewall evasion, IDS/IPS bypass, network intrusion, and traffic manipulation expertise. **Red Team Operators & Ethical Hackers** Develop structured attack methodologies, adversary emulation, and offensive security testing skills. **Compliance & Security Auditors** Perform forensic security assessments, compliance testing, and regulatory framework analysis. ## Hands-On Lab Activities **Web Application Penetration Testing** Exploit web vulnerabilities using SQL injection, XSS, and authentication bypass techniques. **Advanced Network Exploitation** Conduct reconnaissance, privilege escalation, and lateral movement in secured networks. **Cyberattack Forensics & Breach Analysis** Investigate real-world breaches, map attack vectors, and develop mitigation strategies. ## OSCP Course Outcome and Career Opportunities in Dubai The OSCP (Offensive Security Certified Professional) certification validates hands-on expertise in identifying vulnerabilities, simulating cyberattacks, and securing systems. In Dubai, where organizations are rapidly strengthening their digital defenses, OSCP-certified professionals are highly sought after for advanced roles in cybersecurity. Here are a few outcomes that you can expect to achieve after completing the course; - Master advanced penetration testing methodologies used in real-world environments - Gain expertise in exploit development and privilege escalation techniques - Develop strong problem-solving skills under time-bound exam scenarios - Learn to conduct thorough vulnerability assessments and security audits - Build hands-on experience in simulating adversarial attacks (Red Team exercises) - Enhance reporting skills with professional penetration testing documentation ## Career Opportunities After Completing the OSCP Course Penetration Tester, Information Security Specialist, Cybersecurity Consultant, Senior Penetration Tester, Senior Security Consultant, Cybersecurity Manager ## Companies Hiring OSCP Professionals in Dubai DTS Solutions, Help AG, NST Cyber, Dicetek LLC, Ceenex Global LLC, Royal Care General Trading LLC, Versatile Phoenix Hr Service Private Ltd, Inspirec, CyberKnight Technologies, Wattlecorp ## OSCP Training Options **Classroom Training** - 30 Hour OSCP Course in Dubai - In-person training with hands-on access to penetration testing labs. - Direct interaction with expert instructors for real-time guidance. - Small group format ensures personalized attention and mentorship. - Practical exercises in a controlled cybersecurity environment. - Collaborative learning through complex attack simulations. **Live Online Training** - 30 Hour Online OSCP Course - Interactive virtual sessions covering the full OSCP curriculum. - Remote access to virtual penetration testing labs. - Flexible learning format suited for working professionals. - Real-time instructor support for troubleshooting and guidance. - Small batch sizes for an immersive online learning experience. **Corporate Training** - Tailored OSCP training designed for organizational security teams. - Industry-specific penetration testing scenarios and case studies. - Training delivered at client facilities, selected hotels, or Edoxi’s Dubai center. - Flexible scheduling to minimize business operation disruptions. - Hands-on cybersecurity workshops for enterprise-level security teams. ## Why Choose Edoxi for OSCP Training in Dubai Here are a few reasons why you should choose Edoxi for the OSCP Course in Dubai; **Real-World Offensive Security Training** Master ethical hacking and penetration testing through hands-on exploit development. **Advanced Cyber Range & Attack Labs** Train in simulated enterprise environments with unpatched systems and security flaws. **Immersive Learning with Security Platforms** Engage in real-world challenges using TryHackMe and Hack The Box websites. **Mastery of Industry-Leading Exploit Tools** Gain expertise in Metasploit, Burp Suite, Nmap, and custom Python/Bash scripting. **Personalized Mentorship & Expert Guidance** Benefit from a 1 **OSCP Exam-Focused Study Resources** Access official OSCP materials, command cheat sheets, and structured reporting guides. ## Frequently Asked Questions **Q: Is the Offensive Security Certified Professional Training enough to pass the OSCP exam?** A: Yes, Edoxi’s Offensive Security Certified Professional course aligns with OSCP exam objectives, providing hands-on labs, real-world challenges, and expert guidance to develop problem-solving and time management skills. **Q: What are the different career paths and salaries of OSCP-Certified Professionals in Dubai?** A: OSCP-certified professionals in Dubai can pursue rewarding career paths across mid-level and senior-level cybersecurity roles. At the mid-level, positions such as Penetration Tester, Information Security Specialist, and Cybersecurity Consultant typically earn between AED 15,000 – 25,000 per month. With experience, professionals can advance to senior roles like Senior Penetration Tester, Senior Security Consultant, or Cybersecurity Manager, where average monthly salaries range from AED 25,000 to 40,000. **Q: Are there practical assignments outside of the Offensive Security Certified Professional class?** A: Yes, regular hands-on exercises are assigned. Continuous practice in penetration testing labs is essential for mastering OSCP concepts and real-world security scenarios. **Q: What tools and technologies will I learn from the OSCP Certification Training in Dubai?** A: Our OSCP Training covers Metasploit, Burp Suite, Nmap, Hydra, Nikto, and Wireshark, along with scripting in Python and Bash for advanced exploitation. **Q: Do I need prior cybersecurity experience to join Edoxi’s OSCP Course in Dubai?** A: While not mandatory, knowledge of networking, Linux, Windows, and scripting is beneficial. The 1:2 trainer-student ratio ensures personalized learning support. ## About This Course ## About Our OSCP Certification Course in Dubai Edoxi’s 30-hour OSCP training program is designed for professionals who want to master real-world penetration testing. The course blends offensive security strategies with immersive, hands-on attack simulations to build the expertise required to identify, exploit, and mitigate advanced cybersecurity threats. Participants gain extensive hands-on practice through labs that replicate real-world environments, including unpatched systems, enterprise network setups, and simulated security breaches. The training emphasizes the use of industry-standard tools such as Metasploit, Burp Suite, and Nmap, while covering advanced adversary tactics and evasion techniques. Our Offensive Security Certified Professional Course in Dubai is tailored to the cybersecurity needs of diverse sectors such as finance, government, healthcare, and oil & gas industries, where safeguarding critical infrastructure and meeting compliance standards like PCI DSS and GDPR are vital. The OSCP Course curriculum is continuously updated to incorporate emerging threats, red team methodologies, and strategies for expanding attack surface defense. Edoxi’s OSCP training in Dubai equips you with the technical expertise and confidence needed to pass the rigorous OSCP exam conducted by Offensive Security (OffSec). Achieving this globally recognized certification validates your proficiency in ethical hacking, exploit development, and adversary simulation. Enrol now and gain the skills to become a sought-after professional in Dubai’s cybersecurity market. OSCP Exam Details The OSCP certification is a globally recognized benchmark for hands-on penetration testing expertise, valued by top cybersecurity organizations. Check out the exam details. Exam Criteria Details Exam Name Offensive Security Certified Professional (OSCP) Duration 23 hours 45 minutes for the practical exam, plus 24 hours for report submission Exam Structure Three independent targets (60 points total, 20 points each) - Active Directory set with two client machines and one domain controller (40 points total) Passing Score 70 points out of 100 possible points Exam Fee $1,649 (includes PWK course, 90 days lab access, and one exam attempt) Certification Validity OSCP - Lifetime OSCP+ - 3 Years (maintains OSCP status if not renewed) Passing Score Requirements Candidates must score 70 points, which can be achieved through the following combinations: - 40 points (AD) + 3 local.txt flags = 70 points - 40 points (AD) + 2 local.txt flags + 1 proof.txt flag = 70 points - 20 points (AD) + 3 local.txt flags + 2 proof.txt flags = 70 points - 10 points (AD) + 3 fully completed stand-alone machines = 70 points Read More ## How to Get an OSCP Certification in Dubai? Here’s a four-step guide to becoming a certified OSCP professional. 1. Enrol in Edoxi’s OSCP Course in Dubai 2. Attend the training led by industry experts 3. Complete the projects and assessments 4. Get your OSCP Certification from Edoxi ## OSCP Course Modules ### Module 1: Introduction to PEN200 and Penetration Testing with Kali Linux **Chapter 1.1: General Course Introduction** - Lesson 1.1.1: Overview of the Course and Its Components - Lesson 1.1.2: Setting Up an Attacking Kali VM - Lesson 1.1.3: Connecting to and Interacting Over the PWK VPN - Lesson 1.1.4: Understanding Module Exercises **Chapter 1.2: How to Approach the Course** - Lesson 1.2.1: Learning Model Based on Increasing Uncertainty - Lesson 1.2.2: Understanding Different Learning Components in PEN200 **Chapter 1.3: Summary of PWK Learning Modules** - Lesson 1.3.1: High-Level Overview of Each PEN200 Learning Module ### Module 2: Introduction to Cybersecurity **Chapter 2.1: The Practice of Cybersecurity** - Lesson 2.1.1: Challenges Unique to Information Security - Lesson 2.1.2: Offensive vs. Defensive Security - Lesson 2.1.3: Mindsets Applicable to Cybersecurity **Chapter 2.2: Threats and Threat Actors** - Lesson 2.2.1: How Attackers and Defenders Learn from Each Other - Lesson 2.2.2: Differences Between Risks, Threats, Vulnerabilities, and Exploits - Lesson 2.2.3: Classes of Threat Actors - Lesson 2.2.4: Recent Cybersecurity Attacks **Chapter 2.3: The CIA Triad** - Lesson 2.3.1: Importance of Confidentiality - Lesson 2.3.2: Protecting Integrity of Information - Lesson 2.3.3: Ensuring Availability of Information **Chapter 2.4: Security Principles, Controls, and Strategies** - Lesson 2.4.1: Defense in Depth Strategy - Lesson 2.4.2: Threat Intelligence and Its Applications - Lesson 2.4.3: Restricting Access and User Privileges - Lesson 2.4.4: Security Beyond Secrecy - Lesson 2.4.5: Policies and Controls for Threat Mitigation **Chapter 2.5: Cybersecurity Laws, Regulations, Standards, and Frameworks** - Lesson 2.5.1: Legal and Regulatory Issues in Cybersecurity - Lesson 2.5.2: Cybersecurity Frameworks and Standards **Chapter 2.6: Career Opportunities in Cybersecurity** - Lesson 2.6.1: Identifying Career Paths in Cybersecurity ### Module 3: Effective Learning Strategies **Chapter 3.1: Learning Theory** - Lesson 3.1.1: Basics of Memory Mechanisms and Dual Encoding - Lesson 3.1.2: Problems Faced by Learners: The Curve of Forgetting and Cognitive Load **Chapter 3.2: Unique Challenges in Learning Technical Skills** - Lesson 3.2.1: Digital Learning Materials and Their Advantages - Lesson 3.2.2: Preparing for Unknown Scenarios - Lesson 3.2.3: Challenges in Remote and Asynchronous Learning **Chapter 3.3: OffSec Methodology** - Lesson 3.3.1: Understanding Demonstrative Methodology - Lesson 3.3.2: Teaching Approach in OffSec **Chapter 3.4: Case Study: chmod -x chmod** - Lesson 3.4.1: Reviewing Sample Learning Material - Lesson 3.4.2: Understanding OffSec’s Teaching Approach **Chapter 3.5: Tactics and Common Methods** - Lesson 3.5.1: Retrieval and Spaced Practice - Lesson 3.5.2: SQ3R and PQ4R Methods - Lesson 3.5.3: The Feynman Technique - Lesson 3.5.4: The Leitner System **Chapter 3.6: Advice and Suggestions on Exams** - Lesson 3.6.1: Strategies for Exam-Related Stress - Lesson 3.6.2: Recognizing Exam Readiness - Lesson 3.6.3: Practical Exam Approaches **Chapter 3.7: Practical Steps for Learning Success** - Lesson 3.7.1: Long-Term Learning Strategy - Lesson 3.7.2: Time Allotment and Focus Strategies - Lesson 3.7.3: Importance of a Learning Community ### Module 4: Report Writing for Penetration Testers **Chapter 4.1: Understanding Note-Taking** - Lesson 4.1.1: Deliverables in Penetration Testing - Lesson 4.1.2: Portability and Importance of Notes - Lesson 4.1.3: Choosing the Right Note-Taking Tool - Lesson 4.1.4: Importance of Screenshots in Documentation **Chapter 4.2: Writing Effective Technical Penetration Testing Reports** - Lesson 4.2.1: Purpose of a Technical Report - Lesson 4.2.2: Tailoring Content for the Audience - Lesson 4.2.3: Constructing an Executive Summary - Lesson 4.2.4: Technical Summaries and Findings - Lesson 4.2.5: Using Appendices, Resources, and References ### Module 5: Information Gathering **Chapter 5.1: The Penetration Testing Lifecycle** - Lesson 5.1.1: Stages of a Penetration Test - Lesson 5.1.2: Role of Information Gathering in Penetration Testing **Chapter 5.2: Passive Information Gathering** - Lesson 5.2.1: Approaches to Passive Information Gathering - Lesson 5.2.2: Open Source Intelligence (OSINT) - Lesson 5.2.3: Web Server and DNS Passive Information Gathering **Chapter 5.3: Active Information Gathering** - Lesson 5.3.1: Netcat and Nmap Port Scanning - Lesson 5.3.2: DNS, SMB, SMTP, and SNMP Enumeration - Lesson 5.3.3: Living off the Land Techniques ### Module 6: Vulnerability Scanning **Chapter 6.1: Vulnerability Scanning Theory** - Lesson 6.1.1: Understanding Vulnerability Scanning Process - Lesson 6.1.2: Types of Vulnerability Scans **Chapter 6.2: Vulnerability Scanning with Nessus** - Lesson 6.2.1: Installing Nessus and Its Components - Lesson 6.2.2: Configuring and Performing a Vulnerability Scan - Lesson 6.2.3: Interpreting and Working with Nessus Scan Results - Lesson 6.2.4: Performing an Authenticated Vulnerability Scan **Chapter 6.3: Vulnerability Scanning with Nmap** - Lesson 6.3.1: Basics of the Nmap Scripting Engine (NSE) - Lesson 6.3.2: Performing a Lightweight Vulnerability Scan with Nmap - Lesson 6.3.3: Working with Custom NSE Scripts ### Module 7: Introduction to Web Applications **Chapter 7.1: Web Application Assessment Methodology** - Lesson 7.1.1: Web Application Security Testing Requirements - Lesson 7.1.2: OWASP Top 10 and Common Web Vulnerabilities **Chapter 7.2: Web Application Assessment Tools** - Lesson 7.2.1: Enumeration Techniques in Web Applications - Lesson 7.2.2: Web Proxies and Burp Suite **Chapter 7.3: Web Application Enumeration** - Lesson 7.3.1: Debugging Web Application Source Code - Lesson 7.3.2: Inspecting Headers, Cookies, and Source Code **Chapter 7.4: Common Web Application Attacks** - Lesson 7.4.1: Cross-Site Scripting (XSS) - Lesson 7.4.2: Directory Traversal - Lesson 7.4.3: File Inclusion Vulnerabilities - Lesson 7.4.4: File Upload Vulnerabilities - Lesson 7.4.5: Command Injection **Chapter 7.5: SQL Injection Attacks** - Lesson 7.5.1: SQL Theory and Database Types - Lesson 7.5.2: Manual SQL Exploitation ### Module 8: SQL Injection Attacks **Chapter 8.1: Manual and Automated Code Execution** - Lesson 8.1.1: Exploiting MSSQL Databases with xp_cmdshell - Lesson 8.1.2: Automating SQL Injection with SQLmap ### Module 9: Client-Side Attacks **Chapter 9.1: Target Reconnaissance** - Lesson 9.1.1: Gathering Information for Client-Side Attacks - Lesson 9.1.2: Leveraging Client Fingerprinting **Chapter 9.2: Exploiting Microsoft Office** - Lesson 9.2.1: Variations of Microsoft Office Client-Side Attacks - Lesson 9.2.2: Using Microsoft Word Macros **Chapter 9.3: Abusing Windows Library Files** - Lesson 9.3.1: Preparing an Attack Using Windows Library Files - Lesson 9.3.2: Leveraging Windows Shortcuts for Code Execution ### Module 10: Locating Public Exploits **Chapter 10.1: Getting Started with Exploits** - Lesson 10.1.1: Risks of Executing Untrusted Exploits - Lesson 10.1.2: Importance of Analyzing Exploit Code Before Execution **Chapter 10.2: Online Exploit Resources** - Lesson 10.2.1: Accessing Multiple Online Exploit Repositories - Lesson 10.2.2: Differentiating Between Various Exploit Resources - Lesson 10.2.3: Using Google Search Operators to Discover Public Exploits **Chapter 10.3: Offline Exploit Resources** - Lesson 10.3.1: Using Exploit Frameworks and SearchSploit - Lesson 10.3.2: Using Nmap NSE Scripts **Chapter 10.4: Exploiting a Target** - Lesson 10.4.1: Performing a Basic Penetration Test Workflow - Lesson 10.4.2: Discovering and Executing Public Exploits ### Module 11: Fixing Exploits **Chapter 11.1: Fixing Memory Corruption Exploits** - Lesson 11.1.1: High-Level Buffer Overflow Theory - Lesson 11.1.2: Cross-Compiling Binaries - Lesson 11.1.3: Modifying and Updating Memory Corruption Exploits **Chapter 11.2: Fixing Web Exploits** - Lesson 11.2.1: Troubleshooting Common Web Application Exploit Issues ### Module 12: Antivirus Evasion **Chapter 12.1: Antivirus Evasion Software - Key Components and Operations** - Lesson 12.1.1: Recognizing Known vs. Unknown Threats - Lesson 12.1.2: Understanding AV Key Components and Detection Engines **Chapter 12.2: AV Evasion in Practice** - Lesson 12.2.1: Best Practices for Antivirus Evasion Testing - Lesson 12.2.2: Manual Antivirus Evasion Techniques - Lesson 12.2.3: Using Automated Tools for AV Evasion ### Module 13: Password Attacks **Chapter 13.1: Attacking Network Services Logins** - Lesson 13.1.1: Attacking SSH and RDP Logins - Lesson 13.1.2: Attacking HTTP POST Login Forms **Chapter 13.2: Password Cracking Fundamentals** - Lesson 13.2.1: Wordlist Mutation Techniques - Lesson 13.2.2: Basic Password Cracking Methodology - Lesson 13.2.3: Attacking Password Manager Key Files - Lesson 13.2.4: Attacking SSH Private Key Passphrases **Chapter 13.3: Working with Password Hashes** - Lesson 13.3.1: Obtaining and Cracking NTLM Hashes - Lesson 13.3.2: Passing NTLM Hashes - Lesson 13.3.3: Obtaining and Cracking Net-NTLMv2 Hashes - Lesson 13.3.4: Relaying Net-NTLMv2 Hashes ### Module 14: Windows Privilege Escalation **Chapter 14.1: Enumerating Windows** - Lesson 14.1.1: Windows Privileges and Access Control Mechanisms - Lesson 14.1.2: Searching for Sensitive Information on Windows Systems - Lesson 14.1.3: Automated Enumeration Tools for Windows **Chapter 14.2: Leveraging Windows Services** - Lesson 14.2.1: Hijacking Service Binaries and DLLs - Lesson 14.2.2: Abusing Unquoted Service Paths **Chapter 14.3: Abusing Other Windows Components** - Lesson 14.3.1: Using Scheduled Tasks for Privilege Escalation - Lesson 14.3.2: Exploiting Privilege Escalation Vulnerabilities ### Module 15: Linux Privilege Escalation **Chapter 15.1: Enumerating Linux** - Lesson 15.1.1: Files and User Privileges on Linux - Lesson 15.1.2: Manual and Automated Enumeration Techniques **Chapter 15.2: Exposed Confidential Information** - Lesson 15.2.1: Inspecting User and System History Files for Credential Harvesting **Chapter 15.3: Insecure File Permissions** - Lesson 15.3.1: Abusing Insecure Cron Jobs for Privilege Escalation - Lesson 15.3.2: Exploiting Insecure File Permissions **Chapter 15.4: Insecure System Components** - Lesson 15.4.1: Abusing SUID Programs and Capabilities - Lesson 15.4.2: Enumerating Kernel Vulnerabilities for Privilege Escalation ### Module 16: Port Redirection and SSH Tunneling **Chapter 16.1: Port Forwarding with *NIX Tools** - Lesson 16.1.1: Understanding When and Why to Use Port Forwarding - Lesson 16.1.2: Using Socat for Port Forwarding **Chapter 16.2: SSH Tunneling** - Lesson 16.2.1: SSH Local and Dynamic Port Forwarding - Lesson 16.2.2: SSH Remote and Dynamic Remote Port Forwarding **Chapter 16.3: Port Forwarding with Windows Tools** - Lesson 16.3.1: Port Forwarding Using ssh.exe, Plink, and Netsh **Chapter 16.4: Advanced Tunneling** - Lesson 16.4.1: HTTP and DNS Tunneling with Chisel and dnscat ### Module 17: The Metasploit Framework **Chapter 17.1: Getting Familiar with Metasploit** - Lesson 17.1.1: Setting Up and Navigating Metasploit - Lesson 17.1.2: Using Auxiliary and Exploit Modules **Chapter 17.2: Using Metasploit Payloads** - Lesson 17.2.1: Staged vs. Non-Staged Payloads - Lesson 17.2.2: Exploring Meterpreter **Chapter 17.3: Performing Post-Exploitation with Metasploit** - Lesson 17.3.1: Core Meterpreter Features and Modules - Lesson 17.3.2: Pivoting with Metasploit **Chapter 17.4: Automating Metasploit** - Lesson 17.4.1: Using Resource Scripts for Automation ### Module 18: Active Directory Attacks **Chapter 18.1: Active Directory Enumeration** - Lesson 18.1.1: Manual and Automated Enumeration with BloodHound **Chapter 18.2: Attacking Active Directory Authentication** - Lesson 18.2.1: NTLM and Kerberos Authentication Attacks - Lesson 18.2.2: Forging Service Tickets and Impersonating Domain Controllers **Chapter 18.3: Lateral Movement in Active Directory** - Lesson 18.3.1: Pass the Hash, Overpass the Hash, and DCOM Techniques **Chapter 18.4: Active Directory Persistence** - Lesson 18.4.1: Golden Ticket Attacks and Shadow Copy Exploitation ### Module 19: The OSCP Exam **Chapter 19.1: Preparing for the OSCP Exam** - Lesson 19.1.1: Overview of the OSCP Certification Exam - Lesson 19.1.2: Strategies for Taking the OSCP Exam - Lesson 19.1.3: SQL Execution via Automated Tools ## Course Overview - Delivery Modes: Online, Classroom - Course Duration: 30 Hours - Corporate Days: 5 Days - Learners Enrolled: 10+ - Modules: 19 ## Trainer - Name: Maria Mehwish - Designation: Leading Cybersecurity & Cloud Security Trainer Maria Mehwish is a forward-thinking and knowledgeable information security leader with a strong background in building, updating, and maintaining digital protections for various organisations. As a certified CEH, CCSP, CCT, and CISSP Trainer, Maria has a proven track record of delivering innovative and immersive coursework, enhancing learning experiences for cyber threats, ethical hacking, security policy, DevSecOps, and cloud security. With excellent verbal and written communication skills, she is also adept at troubleshooting problems and building successful solutions. Maria is a self-motivated individual with a strong sense of personal responsibility, capable of managing projects from start to finish. Her expertise in Amazon Web Services, Java/Go/Python/C++, DevSecOps, computer security, Linux, penetration testing, and risk analysis, among others, makes her a valuable asset to any organisation. Maria, a British national, is a native English speaker and has intermediate proficiency in Urdu. ## Enrol in This Course - Course URL: https://www.edoxi.com/dubai/oscp-course - Phone: +971 43801666 - Email: info@edoxi.com