KeyW is now part of Jacobs. Learn more about this exciting combination.

Offensive Methodology & Analysis (OMA)

Upcoming Courses

                • January 27 – February 7, 2020

                • May 4 – 15, 2020

                • July 20 – 31, 2020

                • September 14 – 25, 2020

Cost (single seat): $9,200 Course Length: 10 Days

Recommended for: Advanced Students

Additional group and government discounts available. Contact Parrot Labs for more information!

Register for Course

To begin the registration process, click Register Here to complete our Payment Agreement. We will contact you to complete the process.

 Download Course Catalog                                                                                       

What will you get out of OMA?

Teaches current cyber-attack methods to develop strategies to protect and defend networks and critical information. In this course, students will learn to exploit and expand access into remote networks using open source tools, use client-side exploits against web browsers, deploy and control a botnet, and tunnel and pivot deep into a network. This course teaches the essentials of remote network exploitation by demonstrating offensive methodologies in a coherent framework.

What does Parrot Labs’ OMA course offer?

  • Textbook and lab manual to accompany instruction
  • Access to a personal sandboxed network with dozens of virtual machines, including switches, routers, firewalls and Unix and Windows systems
  • Realistic target network with domains populated with simulated personal data to immerse students in detailed scenarios

Why should you enroll in OMA?

Learn to Exploit and Expand Access into Remote Networks Using Open Source Tools.

  • Use client-side exploits against web browsers
  • Deploy and control a botnet
  • Learn how to tunnel and pivot deep into a network

OMA teaches the essentials of remote network exploitation by demonstrating offensive methodologies in a coherent framework.

What topics are covered in OMA?

INFORMATION GATHERING

  • Mine a website for key information
  • Practice techniques to discover new servers

SCANNING & ENUMERATION

  • Scan and enumerate network-based environments using command line tools
  • Discover exploits using web browser enumeration

GAINING ACCESS

  • Practice Metasploit exploits and techniques
  • Discover port redirection and tunneling techniques
  • Learn Cross-Site Scripting (XSS), SQL Injection and file inclusion
  • Execute client-side exploits and botnet deployment

EXPANDING ACCESS

  • Check system safety and security
  • Learn methods for discovering files of interest
  • Practice methods to crack passwords
  • Enumerate Unix and Linux systems

SUSTAINING ACCESS

  • Detect antivirus tools and intrusion detection systems
  • Learn techniques for sustaining access

CAPSTONE

  • The course concludes with a full-day capstone that combines the skills learned throughout the course

The ACE CREDIT logo is a registered trademark of the American Council on Education and cannot be used or reproduced without the express written consent of the American Council on Education.