DB.
HomeWork HistorySkillsCybersecurityBlockchainsPlayground

@ Daniel Burlacu

Courses

    1. Introduction to Cybersecurity
    2. Report Writing for Penetration Testers
    3. Information Gathering
    4. Vulnerability Scanning
    5. Introduction to Web Applications
    6. Common Web Application Attacks
    7. SQL Injection Attacks
    8. Client-Side Attacks
    9. Locating Public Exploits
    10. Fixing Exploits
    11. Antivirus Evasion
    12. Password Attacks
    13. Windows Privilege Escalation
    14. Linux Privilege Escalation
    15. Advanced Tunneling
    16. The Metasploit Framework
    17. Active Directory: Introduction and Enumeration
    18. Attacking Active Directory Authentication
    19. Lateral Movement in Active Directory

    Introduction to Cybersecurity
    OSCP · Chapter 1

    Introduction to Cybersecurity

    What is Cybersecurity?

    Cybersecurity protects systems, networks, and data from unauthorized access and disruption. In the OSCP track we approach it from an offensive angle: ethically finding and exploiting weaknesses so they can be fixed.

    Core Concepts
    • CIA Triad: Confidentiality, Integrity, Availability
    • Threats vs. Vulnerabilities vs. Risk
    • Attack Surface & Entry Points
    • Defense-in-Depth, Least Privilege
    Penetration Testing Phases
    • Recon & Enumeration
    • Exploitation (initial foothold)
    • Post-Exploitation (priv-esc, loot)
    • Documentation & Reporting

    What You’ll Need
    • Kali/Parrot VM + VPN to labs
    • Tools: Nmap, ffuf/Feroxbuster, tmux, LinPEAS/WinPEAS, etc.
    • Strong notes (Obsidian/CherryTree/Markdown)