Offensive Methodology & Analysis (OMA)

Upcoming Courses

 

January 28 – February 8, 2019

 

Cost (single seat): $10,000
Course Length: 10 Days

Recommended for: Advanced Students

Additional group and government discounts available. Contact Parrot Labs for more information.


 Download Course Catalog
                                                                                                                                                     

What will you get out of OMA?

 

Students learn current cyber attack methods to develop strategies to protect and defend their networks and critical information.

What does Parrot Labs’ OMA course offer?

 
  • Textbook and lab manual to accompany instruction
  • Access to a personal sandboxed network with dozens of virtual machines, including switches, routers, firewalls and Unix and Windows systems
  • Realistic target network with domains populated with simulated personal data to immerse students in detailed scenarios
 

Why should you enroll in OMA?

 

Learn to Exploit and Expand Access into Remote Networks Using Open Source Tools.

  • Use client-side exploits against web browsers
  • Deploy and control a botnet
  • Learn how to tunnel and pivot deep into a network
 

OMA teaches the essentials of remote network exploitation by demonstrating offensive methodologies in a coherent framework.

 

What topics are covered in OMA?

 

INFORMATION GATHERING

  • Mine a website for key information
  • Practice techniques to discover new servers
 

SCANNING & ENUMERATION

  • Scan and enumerate network-based environments using command line tools
  • Discover exploits using web browser enumeration
 

GAINING ACCESS

  • Practice Metasploit exploits and techniques
  • Discover port redirection and tunneling techniques
  • Learn Cross-Site Scripting (XSS), SQL Injection and file inclusion
  • Execute client-side exploits and botnet deployment
 

EXPANDING ACCESS

  • Check system safety and security
  • Learn methods for discovering files of interest
  • Practice methods to crack passwords
  • Enumerate Unix and Linux systems
 

SUSTAINING ACCESS

  • Detect antivirus tools and intrusion detection systems
  • Learn techniques for sustaining access
 

CAPSTONE

  • The course concludes with a full-day capstone that combines the skills learned throughout the course

 

The ACE CREDIT logo is a registered trademark of the American Council on Education and cannot be used or reproduced without the express written consent of the American Council on Education.