Advance your career as a penetraion tester
OSCP Training
Benefit from our partnership with OffSec! Unlock your potential in ethical hacking with the comprehensive PEN-200: Penetration Testing with Kali Linux course. This industry-leading program offers hands-on experience with the latest penetration testing methodologies, tools, and techniques, all within a self-paced environment or within our intense bootcamps.
What You'll Get:
-
A 90 day to 12-month subscription to OffSec LearnOne (PEN-200) depending on your choice.
-
Access to our discord server providing continuous support before and after your training.
-
The opportunity to earn the coveted OffSec Certified Professional (OSCP) certification by successfully attacking and penetrating live machines in a secure lab environment. Recognized for its technical rigor, the OSCP certification sets you apart by requiring practical, real-world penetration testing skills.
Our Annual
Public & Private Training
Ready to take your skills to the next level? Sign up for our training today and start your journey toward becoming an OSCP-certified professional! Explore our course schedule now to find the session that best fits your needs. Don’t miss this opportunity—secure your spot and get started!
How does it work?
Depending on your chosen format, our course offers two flexible options: an intensive 5-day bootcamp running from Monday to Friday or remote sessions spread out over multiple days.
In either format, we’ll guide you through the relevant course materials with a strong emphasis on hands-on practice in the OffSec lab.
Our training doesn’t stop at technical skills—we’ll conclude with an exam-like event designed to thoroughly prepare you for the real exam.
To ensure you're fully supported, we'll connect with you via Discord both before the bootcamp begins and afterward, to address any questions that arise.
Prerequisites
To get the most out of this course, learners should have:
-
A strong understanding of TCP/IP networking
-
Solid experience in Windows and Linux administration
-
Basic familiarity with Bash and/or Python scripting
Who Should Enroll
This course is ideal for:
-
Infosec professionals transitioning into penetration testing
-
Pen testers aiming to earn one of the top certifications in the field
-
Individuals pursuing a career as a penetration tester
-
Security professionals looking to enhance their skill set
-
Network administrators seeking to broaden their expertise
-
Other technology professionals interested in cybersecurity
Our Annual
Public & Private Training
Ready to take your skills to the next level? Sign up for our training today and start your journey toward becoming an OSCP-certified professional! Explore our course schedule now to find the session that best fits your needs. Don’t miss this opportunity—secure your spot and get started!
New to penetration testing?
If you're just starting out, set yourself up for success with a subscription to Learn Fundamentals. This resource will help you grasp essential cybersecurity concepts, develop the mindset needed for a successful career in cybersecurity, and fulfill the prerequisites for OffSec’s advanced courses.
Syllabus
The PEN-200 OSCP syllabus is structured to provide comprehensive training in penetration testing using Kali Linux. It covers the following key areas:
​
-
Introduction to Penetration Testing: Understanding the basics of ethical hacking, legal considerations, and the penetration testing process.
-
Command Line and Scripting: Mastery of essential Linux command-line tools and basic scripting with Bash and Python for automation.
-
Information Gathering: Techniques for active and passive reconnaissance to collect data on target systems.
-
Vulnerability Analysis: Identifying and assessing vulnerabilities in systems and networks.
-
Exploitation: Gaining unauthorized access by exploiting vulnerabilities in various operating systems, applications, and services.
-
Password Attacks: Techniques for cracking passwords and understanding common authentication flaws.
-
Port Redirection and Tunneling: Methods for bypassing network security controls and accessing internal systems.
-
Active Directory Attacks: Exploiting Windows Active Directory environments, including Kerberos attacks and pivoting.
-
Web Application Attacks: Discovering and exploiting common web vulnerabilities like SQL injection, XSS, and file inclusion.
-
Buffer Overflows: Writing and exploiting buffer overflow vulnerabilities in Windows and Linux environments.
-
Client-Side Attacks: Targeting client systems through phishing and malicious files.
-
Post-Exploitation: Techniques for maintaining access, privilege escalation, and data exfiltration after gaining entry.
-
Reporting: Preparing professional penetration testing reports that document findings and provide actionable recommendations.