Cybersecurity Certifications Syllabus
CompTIA Pentest+ Syllabus
-
1. Planning and Scoping
- Engagement Limitations and Scope
- Client and Project Management
- Legal and Compliance
-
2. Information Gathering and Vulnerability Identification
- Information Gathering Techniques:
- Passive Information Gathering
- Active Information Gathering
- Vulnerability Identification:
- Manual and Automated Scanning
- Common Vulnerability Exposure (CVE)
- Interpreting Results
-
3. Attacks and Exploits
- Social Engineering Attacks:
- Phishing, Pretexting, Baiting
- Physical Social Engineering
- Network-Based Attacks:
- Man-in-the-Middle (MITM)
- DoS and DDoS Attacks
- Wireless Attacks
- Application-Based Attacks:
- SQL Injection, XSS
- Buffer Overflows, Command Injection
- Web Application Vulnerabilities
- Post-Exploitation Techniques:
- Privilege Escalation
- Persistence Mechanisms
- Lateral Movement
-
4. Penetration Testing Tools
- Network Tools:
- Nmap, Netcat, Wireshark
- Metasploit Framework
- Web Application Tools:
- Burp Suite, OWASP ZAP
- SQLmap, Nikto
- Scripting and Development:
- Bash, PowerShell Scripting
- Python for Automation
-
5. Reporting and Communication
- Report Writing:
- Executive Summary
- Detailed Technical Findings
- Risk Analysis and Remediation:
- Assessing Vulnerability Severity
- Recommending Improvements
- Communication Skills:
- Presenting Findings
- Handling Post-Engagement Debriefs
-
6. Tools and Resources
- Labs and Simulations:
- Hands-on Labs
- Virtual Machines
- Study Materials:
- Official CompTIA Guides
- Practice Exams
Offensive Security Certified Professional (OSCP) Syllabus
-
1. Penetration Testing Overview and Methodologies
- Overview of Penetration Testing Process:
- Information Gathering
- Target Scoping
- Vulnerability Analysis
- Exploitation
- Post-Exploitation
- Reporting
- Understanding Methodologies:
- Offensive Security Methodologies
- Best Practices and Ethics
-
2. Information Gathering and Enumeration
- Network Scanning Techniques:
- Identifying Live Hosts
- Enumerating Services and Ports
- Advanced Enumeration Techniques:
- SMB, SNMP Enumeration
- NFS, DNS, SMTP Enumeration
- Web Application Enumeration:
- Directory Traversal
- Spidering
- Identifying Technologies
-
3. Vulnerability Analysis
- Assessment Techniques:
- Automated Scanning Tools
- Manual Analysis
- Common Vulnerabilities
- Analyzing Exploits:
- Exploit Development
- Shellcode and Payload Delivery
-
4. Exploitation
- Network Exploitation:
- Exploiting Services
- Buffer Overflows
- Web Application Exploitation:
- SQL Injection, XSS, CSRF
- Authentication Bypass
- Privilege Escalation:
- Linux and Windows Techniques
- Kernel Exploits
- Password Attacks:
- Brute-Force, Cracking Tools
- Credential Harvesting
-
5. Post-Exploitation
- Persistence Techniques:
- Maintaining Access
- Backdoors and Rootkits
- Data Exfiltration:
- Harvesting Information
- Tunneling Data
- Lateral Movement:
- Pivoting
- Exploiting Trust Relationships
- Clearing Tracks:
- Log Manipulation
- Covering Tracks
-
6. Reporting
- Report Writing:
- Detailed Reports
- Executive Summaries
- Remediation Recommendations
- Communication Skills:
- Presenting Findings
- Client Communication
-
7. Hands-on Labs
- Practice Labs:
- Network and Web Scenarios
- CTF Challenges
- Virtual Labs