1. Home
  2. Training Library
  3. Learning Path Introduction

Learning Path Introduction

Contents

keyboard_tab
Pentesting & Privilege Escalation

The course is part of this learning path

Learning Path Introduction
Overview
Difficulty
Beginner
Duration
5m
Students
11
Description

This course introduces the Practical Deep Dive into Pentesting & Privilege Escalation learning path and covers what you will learn and what you should already know before you begin.

Transcript

Hi. Before we dive into the pentesting and privilege escalation in this course, I wanted to show you what we're going to learn, and also more importantly, what should you know before taking this course as well. Before taking this course, you should be experienced with basics of the cybersecurity, fundamentals of the cybersecurity in a way that you should be comfortable just diving into the penetration tests. So, what do I mean by that? So, if you have taken our complete ethical hacking course or any other course on online platforms or any other platform as well, then maybe you're actually aware of this hacker methodology steps. 

So, if you google hacker methodology, you will be presented in a diagram something like this. So, sometimes we see different names for the steps, but it generally goes like this. It starts with reconnaissance, and scanning, and identifying vulnerabilities. So, we scan the target system that we're trying to hack into, we try to find vulnerabilities, we try to gather information about the system, then we exploit those vulnerabilities and we gain access to that system. And then, we generally try to find a way to escalate our privileges so that we can be administrator or we can be root depending on the operating system so that we can actually report all the steps, all the necessary steps to make the system more secure so that we can be a good cybersecurity, another star cybersecurity managers or something like that.

So, what we're going to focus on during this course is not the reconnaissance or scanning or identifying vulnerabilities. Actually, we're just going to focus on this whole thing. We're just going to focus on this whole thing, whole penetration testing system, all hacker methodology. But we're just going to actually intensely look at the identifying vulnerabilities and gaining access and also the privilege escalation. So, if you're trying to get an OSCP certificate or any other certification as well, this course is right for you. If you have the basics, if you have the fundamentals of the cybersecurity and if you're trying to take your level to the next one, then this is the right course for you. We're just going to dive into the penetration testing and we're going to solve a lot of capture the flag, CTFs. We're going to work with OneHop, we're going to work with TryHackMe, we're going to work with HackTheBox CTFs, and we're going to see how a problem or how a machine with vulnerabilities can be hacked, how a problem is solved in this equation. Okay? And the privilege escalation is a subject, is a very neat subject that we should focus on very much if we really want to go into the details of the OSCP certification or the cybersecurity in general. And most of the time, it's underestimated and it's not placed or at least it's not getting the attention it deserves in many of the courses. So, I actually allocated a good amount of this course to the privilege escalation. So, if you're trying to learn about privilege escalation or if you're trying to move your levels, move your knowledge to the next level, then you're at the right place. But again, this is an intermediate to advanced course, and we're going to take a look at all of the section. We're going to solve a lot of CTFs and actually we're going to solve CTFs all the time. So, this is all hands-on training. Of course, we're not going to neglect the theory, we're just going to understand what's going on behind the curtains as well, but it's all going to be hands-on, we're going to practice all the time, we're going to solve all of those things that you're seeing right now. And also, we're not only going to focus on the Linux, we're going to focus on the Windows as well. That's why we're going to need a premium HackTheBox account at the last sections in the Devel, Arctic, and Windows privilege escalation sections, I'm going to talk about that during the course. This is due to the Windows licensing features. Okay? And if you don't want to pay for that, it's okay, you can just watch those sections. But for the 80% of the course, you can just go for free. Okay? It's not a problem. So, enough talking, let's just dive into the stuff. We're going to start with the Bandit within the next section together.

About the Author
Students
198
Courses
55
Learning Paths
3

Atil is an instructor at Bogazici University, where he graduated back in 2010. He is also co-founder of Academy Club, which provides training, and Pera Games, which operates in the mobile gaming industry.