<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: prateek pulastya</title>
    <description>The latest articles on DEV Community by prateek pulastya (@prateek_pulastya_9975efac).</description>
    <link>https://dev.to/prateek_pulastya_9975efac</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3454005%2F4b7eddf7-2425-47e1-9704-fbcb216e8fc4.jpg</url>
      <title>DEV Community: prateek pulastya</title>
      <link>https://dev.to/prateek_pulastya_9975efac</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/prateek_pulastya_9975efac"/>
    <language>en</language>
    <item>
      <title>Passed the Hackviser CAPT Certification – My Module-by-Module Experience 🎯</title>
      <dc:creator>prateek pulastya</dc:creator>
      <pubDate>Sat, 06 Sep 2025 08:29:01 +0000</pubDate>
      <link>https://dev.to/prateek_pulastya_9975efac/passed-the-hackviser-capt-certification-my-module-by-module-experience-1877</link>
      <guid>https://dev.to/prateek_pulastya_9975efac/passed-the-hackviser-capt-certification-my-module-by-module-experience-1877</guid>
      <description>&lt;p&gt;I recently completed the Hackviser Certified Associate Penetration Tester (CAPT) certification, and I wanted to share my breakdown for anyone considering it. This course is currently free (for a limited time) and is perfect for beginners and intermediates who want hands-on experience with penetration testing.&lt;/p&gt;

&lt;p&gt;Module Highlights&lt;/p&gt;

&lt;h2&gt;
  
  
  🟢 1. Introduction
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Ethical hacking mindset&lt;/li&gt;
&lt;li&gt;Attacker vs defender framework&lt;/li&gt;
&lt;li&gt;Role of a penetration tester&lt;/li&gt;
&lt;li&gt;Scope of pentesting in security&lt;/li&gt;
&lt;li&gt;Sets learning objectives clearly&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;👉 Takeaway: Strong ethical grounding from the start.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  💻 2. Operating Systems Fundamentals
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Linux basics: shell, file system&lt;/li&gt;
&lt;li&gt;Windows command line &amp;amp; admin tasks&lt;/li&gt;
&lt;li&gt;System navigation for pentesting&lt;/li&gt;
&lt;li&gt;Dual-environment familiarity&lt;/li&gt;
&lt;li&gt;CLI practice across platforms&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;👉 Takeaway: Comfort with OS = confidence in attacks.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  🔐 3. Cryptology Fundamentals
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Encoding vs hashing vs encryption&lt;/li&gt;
&lt;li&gt;Weak crypto implementations&lt;/li&gt;
&lt;li&gt;Cipher cracking labs&lt;/li&gt;
&lt;li&gt;Secure communication basics&lt;/li&gt;
&lt;li&gt;Hands-on crypto analysis&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;👉 Takeaway: Cryptography is central to both attack and defense.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  🌐 4. Network Security &amp;amp; Pentesting
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Nmap scanning basics&lt;/li&gt;
&lt;li&gt;Metasploit introduction&lt;/li&gt;
&lt;li&gt;Reconnaissance &amp;amp; footprinting&lt;/li&gt;
&lt;li&gt;Mapping vulnerabilities&lt;/li&gt;
&lt;li&gt;Simulated network exploitation&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;👉 Takeaway: Recon is everything—maps the path forward.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  🌍 5. Web Application Security
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;SQL Injection, XSS, Command Injection&lt;/li&gt;
&lt;li&gt;File Inclusion vulnerabilities&lt;/li&gt;
&lt;li&gt;33 modules of web exploit labs&lt;/li&gt;
&lt;li&gt;Attacker mindset in web apps&lt;/li&gt;
&lt;li&gt;Defender strategies (patches/mitigation)&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;👉 Takeaway: Web is the frontline—must-know for pentesters.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  🧑‍💻 6. Privilege Escalation
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Linux escalation techniques&lt;/li&gt;
&lt;li&gt;Windows escalation methods&lt;/li&gt;
&lt;li&gt;Misconfiguration exploitation&lt;/li&gt;
&lt;li&gt;Horizontal vs vertical escalation&lt;/li&gt;
&lt;li&gt;Practical lab chaining&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;👉 Takeaway: Access ≠ control—escalation matters.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  🔎 7. OSINT
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Public data reconnaissance&lt;/li&gt;
&lt;li&gt;Tools for footprinting&lt;/li&gt;
&lt;li&gt;Transform OSINT into exploit paths.&lt;/li&gt;
&lt;li&gt;Strategic vulnerability hunting&lt;/li&gt;
&lt;li&gt;Real-world recon scenarios&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;👉 Takeaway: Most hacks start with Google.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  🎭 8. Social Engineering
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Phishing campaign basics&lt;/li&gt;
&lt;li&gt;Psychological exploitation&lt;/li&gt;
&lt;li&gt;Human factor in pentests&lt;/li&gt;
&lt;li&gt;Safe simulations&lt;/li&gt;
&lt;li&gt;One-module focus&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;👉 Takeaway: Humans are the weakest link.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  🧩 9. Real-World Scenarios
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Full pentest workflow&lt;/li&gt;
&lt;li&gt;Network + web + OS skills combined&lt;/li&gt;
&lt;li&gt;Simulated attack chains&lt;/li&gt;
&lt;li&gt;Reporting &amp;amp; documentation&lt;/li&gt;
&lt;li&gt;Confidence-building final labs&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;👉 Takeaway: Practice ties theory into readiness.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Why You Should Take This
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Beginner-to-intermediate friendly&lt;/li&gt;
&lt;li&gt;Fully hands-on, no fluff&lt;/li&gt;
&lt;li&gt;A certificate adds credibility.&lt;/li&gt;
&lt;li&gt;Builds fundamental skills employers value&lt;/li&gt;
&lt;li&gt;Free right now&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>cybersecurity</category>
      <category>webtesting</category>
      <category>infosec</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Completed the OCI AI Foundations Associate (2025) Certification – My Key Learnings 🚀</title>
      <dc:creator>prateek pulastya</dc:creator>
      <pubDate>Sat, 23 Aug 2025 07:33:13 +0000</pubDate>
      <link>https://dev.to/prateek_pulastya_9975efac/completed-the-oci-ai-foundations-associate-2025-certification-my-key-learnings-22l0</link>
      <guid>https://dev.to/prateek_pulastya_9975efac/completed-the-oci-ai-foundations-associate-2025-certification-my-key-learnings-22l0</guid>
      <description>&lt;p&gt;I recently completed the OCI AI Foundations Associate (2025) certification, and I wanted to share my experience + notes for anyone interested in getting started.&lt;/p&gt;

&lt;p&gt;This learning path is beginner-friendly, but it still dives into some powerful AI concepts, especially around Generative AI and Oracle Cloud services. Here’s what stood out to me:&lt;/p&gt;

&lt;p&gt;🧠 &lt;strong&gt;&lt;em&gt;Module 1: AI Learning Essentials&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Clear breakdown of AI, ML, and DL differences.&lt;/li&gt;
&lt;li&gt;Types of ML: supervised, unsupervised, and reinforcement learning.&lt;/li&gt;
&lt;li&gt;Neural networks, CNNs, and sequence models explained.&lt;/li&gt;
&lt;li&gt;Jupyter Notebook demos for regression &amp;amp; classification.&lt;/li&gt;
&lt;li&gt;Importance of Data Preparation and Model Evaluation.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Key takeaway: solid AI fundamentals before moving to advanced stuff.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;🤖 &lt;strong&gt;&lt;em&gt;Module 2: Generative AI with OCI&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Basics of transformers, LLMs, and prompt engineering.&lt;/li&gt;
&lt;li&gt;Hands-on look at OCI AI services: Vision, Document AI, Speech, Generative AI.&lt;/li&gt;
&lt;li&gt;How vector search &amp;amp; embeddings make LLMs contextual.&lt;/li&gt;
&lt;li&gt;Focus on Responsible AI (fairness, transparency).&lt;/li&gt;
&lt;li&gt;OCI’s GPU clusters &amp;amp; superclusters = enterprise-ready AI infra.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Key takeaway: Generative AI is powerful when combined with OCI’s scalable ecosystem.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;✅ &lt;strong&gt;_Module 3: Certification Prep&lt;br&gt;
_&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Structured study strategy for the exam.&lt;/li&gt;
&lt;li&gt;Knowledge checks &amp;amp; sample questions.&lt;/li&gt;
&lt;li&gt;Emphasis on responsible AI in practice.&lt;/li&gt;
&lt;li&gt;Time management tips for the test.&lt;/li&gt;
&lt;li&gt;Built confidence to clear the exam.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Key takeaway: Prep smartly, not just hard.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;🎯 &lt;strong&gt;Why This Cert Was Worth It&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Firm grounding in AI basics.&lt;/li&gt;
&lt;li&gt;Hands-on exposure to Generative AI.&lt;/li&gt;
&lt;li&gt;Practical view of OCI AI tools &amp;amp; services.&lt;/li&gt;
&lt;li&gt;Boosted career credibility with a global cert.&lt;/li&gt;
&lt;li&gt;Clearer vision of how AI + Cloud can solve real-world problems.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;🚀 &lt;strong&gt;Final Thoughts&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you’re a developer, student, or tech enthusiast—this cert is a great entry point into AI + Cloud. It combines fundamentals with practical, cloud-native AI applications.&lt;/p&gt;

&lt;p&gt;I’d recommend it to anyone curious about how Generative AI is shaping the enterprise world.&lt;/p&gt;

</description>
      <category>oracle</category>
      <category>cloudcomputing</category>
      <category>ai</category>
      <category>career</category>
    </item>
  </channel>
</rss>
