7. Deploying Smart Contracts on the Ethereum Network
8. Interacting with Smart Contracts
9. Using Ethereum CLI and SDKs
10. Developing Decentralized Applications (DApps)
11. Smart Contract Security Best Practices
12. Testing and Debugging Smart Contracts
13. Optimizing Performance on Ethereum
14. Exploring Ethereum Ecosystem Tools
1. Introduction to Blockchain and Polygon
2. Setting Up Your Development Environment
3. Polygon Architecture and Key Concepts
4. Creating and Managing Wallets
5. Understanding Smart Contracts on Polygon
6. Building Your First Smart Contract on Polygon
7. Deploying Smart Contracts on the Polygon Network
8. Interacting with Smart Contracts on Polygon
9. Using Polygon CLI and SDKs
10. Developing Decentralized Applications (DApps) on Polygon
11. Smart Contract Security Best Practices for Polygon
12. Testing and Debugging Smart Contracts on Polygon
13. Optimizing Performance on Polygon
14. Exploring Polygon Ecosystem Tools
1. Introduction to Cybersecurity
2. Report Writing for Penetration Testers
3. Information Gathering
4. Vulnerability Scanning
5. Introduction to Web Applications
6. Common Web Application Attacks
7. SQL Injection Attacks
8. Client-Side Attacks
9. Locating Public Exploits
10. Fixing Exploits
11. Antivirus Evasion
12. Password Attacks
13. Windows Privilege Escalation
14. Linux Privilege Escalation
15. Advanced Tunneling
16. The Metasploit Framework
17. Active Directory: Introduction and Enumeration
18. Attacking Active Directory Authentication
19. Lateral Movement in Active Directory
Introduction to Cybersecurity
OSCP · Chapter 1
Introduction to Cybersecurity
What is Cybersecurity?
Cybersecurity protects systems, networks, and data from unauthorized access and disruption. In the OSCP track we approach it from an offensive angle: ethically finding and exploiting weaknesses so they can be fixed.
Core Concepts
CIA Triad: Confidentiality, Integrity, Availability
Threats vs. Vulnerabilities vs. Risk
Attack Surface & Entry Points
Defense-in-Depth, Least Privilege
Penetration Testing Phases
Recon & Enumeration
Exploitation (initial foothold)
Post-Exploitation (priv-esc, loot)
Documentation & Reporting
What You’ll Need
Kali/Parrot VM + VPN to labs
Tools: Nmap, ffuf/Feroxbuster, tmux, LinPEAS/WinPEAS, etc.