Update to the #Iranian #Offensive Cyber Roadmap

Below is a recent update to the #Iranian #Offensive #Cyber #Security #Roadmap in their own words (original here: https://cybershafarat.com/2019/06/02/irhackersans/ )

#0x01 Network Plus
Understand the structure of the networks and layers used.
https://certification.comptia.org/certifications/network
# 0x02 LPIC 1 & 2
Introduction to Linux operating system and Bash language.
https://www.lpi.org/our-certifications/lpic-1-overview
https://www.lpi.org/our-certifications/lpic-2-overview
# 0x03 Certified Ethical Hacker (CEH)
Introduction to the concepts used in cyber sciences.
https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/
# 0x04 Computer Hacking Forensic Investigator (CHFI)
Familiarity with the techniques of tracking and analyzing the traces left by the hacker.
https://www.eccouncil.org/programs/computer-hacking-forensic-investigator-chfi/
# 0x05 HTML / CSS / XML & JavaScript Programming
Learn the languages ​​used in web apps.
https://www.w3schools.com
# 0x06 PHP & SQL Programming
Familiar with popular server-side languages ​​and database languages.
https://www.w3schools.com/php/default.asp
https://www.w3schools.com/sql/default.asp

***************************************

Where they get the training: https://cybershafarat.com/2019/07/06/sansirancehciscomicrosoft/

***************************************
# 0x07 SEC460: Enterprise Threat and Vulnerability Assessment
Learn about the SEC460 course to learn goal-gathering techniques.
https://www.sans.org/course/enterprise-threat-vulnerability-assessment
# 0x08 SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis
Understanding the open environment for collecting information on goals.
https://www.sans.org/course/open-source-intelligence-gathering
# 0x09 SEC503: Intrusion Detection In-Depth
In this course you will learn the techniques for identifying attacks and understand their performance.
https://www.sans.org/course/intrusion-detection-in-depth

https://twitter.com/uutctf
# 0x10 SEC542: Web App Penetration Testing and Ethical Hacking
Understanding the early course of web app vulnerabilities and their mastering techniques.
https://www.sans.org/course/web-app-penetration-testing-ethical-hacking
# 0x11 SEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques
Understanding the advanced course of new and dangerous vulnerabilities.
https://www.sans.org/course/advanced-web-app-penetration-testing-ethical-hacking
# 0x12 SEC573: Automating Information Security with Python
In this course you will learn several Python language security aspects.
https://www.sans.org/course/automating-information-security-with-python
# 0x13 DEV522: Defending Web Applications Security Essentials
Learn how to write Sanitization and Secure Coding algorithms in this course.
https://www.sans.org/course/defending-web-applications-security-essentials

**************************************************************************

US Companies involved in allowing their training to be given to Iran

https://cybershafarat.com/2019/04/25/iran-hackers-cyber-security-training/

**************************************************************************
Advanced Web Attacks and Exploitation (AWAE)
Understand the highest level of web attack training.
https://www.offensive-security.com/information-security-training/advanced-web-attack-and-exploitation/
# 0x15 ActionScript & VBScript Programming
Knowledge of scripting languages ​​for file formats.
https://www.adobe.com/devnet/actionscript/learning.html
https://docs.microsoft.com/en-us/previous-versions//d1wf56tt%28v%3dvs.85%29
# 0x16 SEC401: Security Essentials Bootcamp Style
Introduction to basic tools of traffic analysis and networking in this course.
https://www.sans.org/course/security-essentials-bootcamp-style
# 0x17 SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
Learn about all the tools for identifying web and network vulnerabilities.
https://www.sans.org/course/hacker-techniques-exploits-incident-handling
# 0x18 SEC560: Network Penetration Testing and Ethical Hacking
Understand the methods of interception and spoofing on the network.
https://www.sans.org/course/network-penetration-testing-ethical-hacking
# 0x19 SEC575: Mobile Device Security and Ethical Hacking
Learn about mobile app penetration testing and how to deploy platforms on their platform.
https://www.sans.org/course/mobile-device-security-ethical-hacking

D_k71bQWwAE8vP4
# 0x20 Penetration Testing Training with Kali Linux
Introduction to the Kali Linux operating system.
https://www.offensive-security.com/information-security-training/penetration-testing-training-kali-linux/
# 0x21 Offensive Security Wireless Attacks (WiFu)
Understand the intrusion and crack techniques of wireless networks and bypass their defense mechanisms.
https://www.offensive-security.com/information-security-training/offensive-security-wireless-attacks/

# 0x22 SEC617: Wireless Penetration Testing and Ethical Hacking
Learn how to exploit wireless networks and advanced attacks like EvilTwin.
https://www.sans.org/course/wireless-penetration-testing-ethical-hacking
# 0x23 SEC562: CyberCity Hands-on Kinetic Cyber ​​Range Exercise
Familiarity with the process of penetration testing scenarios in RedTeam and BlueTeam environments at all levels.
https://www.sans.org/course/cybercity-hands-on-kinetic-cyber-range-exercise
# 0x24 C / C ++ & Assembly Programming
Familiarity with C ++ and Assembly, which is a framework for understanding memory vulnerabilities.


# 0x25 Windows Internals & LPIC 3
Full knowledge of the performance of Windows operating systems, as well as the operating structure of Linux operating systems.
Public Remote Windows Internals Training
https://www.lpi.org/our-certifications/lpic-3-300-overview

# 0x26 SEC505: Securing Windows and PowerShell Automation
Familiarity with the PowerShell language for intrusion testing, as well as automating Windows.
https://www.sans.org/course/securing-windows-with-powershell

# 0x27 SEC599: Defeating Advanced Adversaries – Purple Team Tactics & Kill Chain Defenses
Learn about all the mastery tactics and how to avoid it.
https://www.sans.org/course/defeating-advanced-adversaries-kill-chain-defenses
# 0x28 FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Understand the course of malware or ransomware analysis and their reverse engineering techniques.
https://www.sans.org/course/reverse-engineering-malware-malware-analysis-tools-techniques

2ylbKam7_400x400
# 0x29 Advanced Fuzzing and Crash Analysis
Understand Random Test Programs File formats and protocols for identifying memory vulnerabilities.
https://www.ringzer0.training/advanced-fuzzing-crash-analysis.html
# 0x30 The Shellcode Lab
Learn how to write multiple syllables on assembly language and their ambiguity techniques.
https://www.blackhat.com/us-18/training/the-shellcode-lab.html
# 0x31 SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Familiarity with memory vulnerabilities and their different models.
https://www.sans.org/course/advanced-penetration-testing-exploits-ethical-hacking
# 0x32 SEC760: Advanced Exploit Development for Penetration Testersg
Understand the advanced course of exploitation and methods of bypassing defense mechanisms.
https://www.sans.org/course/advanced-exploit-development-penetration-testers
# 0x33 Advanced Windows Exploitation (AWE)
Understand the highest level of memory level attacks whether on the browser platform or on the file formats platform.
https://www.offensive-security.com/information-security-training/advanced-windows-exploitation/
# 0x34 HackSys Extreme Vulnerable Driver
Full knowledge of kernel surface vulnerabilities and methods of bypassing kernel defense mechanisms.

HackSys Extreme Vulnerable Driver


# 0x35 The ARM IoT Exploit Laboratory
Understand vulnerability and exploit exploits on the platform of ARM processors.
https://www.ringzer0.training/arm-iot-exploitlab.html
# 0x36 Offensive Mobile Exploitation & Reversing
Familiarity with advanced exploits and reverse engineering on the platform of Android operating systems.
https://www.blackhat.com/us-18/training/offensive-mobile-exploitation-and-reversing.html
# 0x37 iOS Kernel Exploitation
Familiarity with exploit writing on iOS platform and kernel-level attacks.
https://www.ringzer0.training/ios-kernel-exploitation.html
# 0x38 Windows Kernel Rootkits: Techniques and Analysis
Understand rootkit techniques and bypass rootkit identification mechanisms.
https://www.ringzer0.training/windows-kernel-rootkits.html
# 0x39 System Firmware Attack and Defense for the Enterprise
Understand the hardware attacks on the UEFI Bootkit platform.
https://www.ringzer0.training/system-firmware-attack-defense.html
# 0x40 The Security Automation Lab
Learn how to automate many intrusion testing processes.
https://www.blackhat.com/us-18/training/the-security-automation-lab.html