Offensive Methodology & Analysis (OMA)
Issued by
Jacobs Cyber Mission Training
Students sustain computer network operations using open-source tools and Metasploit. Topics include info gathering; packet capture & analysis; browser enumeration; gaining, increasing, & sustaining access; Armitage; client-side exploitation & XSS; file inclusion attacks; SQL; botnets; tunneling & redirection; Windows registry interrogation, offensive digital forensics & hashes; AD interrogation; Linux & Unix; network device ODF. The next class in our exploitation series is Advanced-OMA.
- Type Certification
- Level Advanced
- Time Weeks
- Cost Paid
Skills
Earning Criteria
-
The method of assessment includes a capstone examination with a minimum passing score of 79 percent.
-
The methods of instruction include practical exercises, discussion, and lecture.