Offensive Cyber Operations
In this course, you’ll learn to think like an adversary to enhance your cybersecurity skills by exploring attacker methods, attack surfaces, and exploitation techniques while mastering frameworks like MITRE ATT&CK.
Segment 00: Reading - Welcome to the Course: Course Overview
Segment 01: Course Goals and SME Introduction
Segment 02: Chapter Introduction
Segment 03: Defining Offensive Cyber Operations
Segment 04: Core Concepts: Attack Surface, Vulnerabilities, and Exploits
Segment 05: The Role of Ethical Hacking in Understanding Offense
Segment 06: Why Attackers Exploit Human Trust
Segment 07: The Psychology of Social Engineering
Segment 08: The Attacker's Mindset and Operational Goals
Segment 09: Types of Cyber Adversaries and Their Motivations
Segment 10: The Attacker's Life Cycle: An Overview
Segment 11: Evolution of Offensive Security
Segment 12: Reading - Cultivating a Hacker Mindset in Cybersecurity Defense
Segment 13: Hands-On-Learning - Understanding the Attack Surface
Segment 14: Quiz - Foundations & Attacker Mindset
Segment 15: Chapter Introduction
Segment 16: Reconnaissance: Gathering Information
Segment 17: OSINT and Passive Reconnaissance
Segment 18: Weaponization: Crafting the Attack Payload
Segment 19: Delivery Methods for Malicious Payloads
Segment 20: Exploitation Techniques Explained
Segment 21: Common Exploits and Vulnerability Types