Information Security Training

World Class Information Security Training by Offensive Security

Pentesting with Kali Linux

Penetration Testing with Kali Linux

Penetration Testing with Kali Linux is an online information security training course designed for network administrators and security professionals who need to acquaint themselves with the world of offensive information security. This penetration testing training introduces the latest hacking tools and techniques in the field and simulates a full penetration test, from start to finish, by injecting the student into a diverse and vulnerable network.

More Info

Metasploit Unleashed

Metasploit Unleashed

Metasploit Unleashed is a free online information security training course that was created to fill a gap in quality documentation on the practical usage of the popular and versatile Metasploit Framework. In keeping with the open-source nature of Metasploit, we provide this resource free of charge to the information security community. Any and all donations received are donated to Hackers for Charity.

More Info

Wireless Attacks

Offensive Security Wireless Attacks

Offensive Security Wireless Attacks teaches students the base concepts of wireless networking and builds upon that foundation to conduct effective attacks against wireless networks of varying configurations. Not just for penetration testers, this course is highly recommended for anyone responsible for wireless networks. By understanding how they are attacked, administrators will know how best to protect their wireless infrastructure.

More Info

Cracking the Perimeter

Cracking the Perimeter

Cracking the Perimeter takes all of the skills acquired in the Penetration Testing with Kali Linux course and further hones them by exposing students to an extremely challenging lab environment developed using actual scenarios faced by the Offensive Security team during live penetration tests. During the course, students are given an in depth examination of the vectors used by today’s attackers to breach infrastructure security.

More Info

Advanced Windows Exploitation

Advanced Windows Exploitation

Advanced Windows Exploitation makes use of extensive hands-on material, covering such advanced topics as DEP and ASLR evasion, heap spraying, function pointer overwrites, buffer space limitations, Windows driver exploits, and creating custom hand-made shellcode. This is not an entry-level course. Experience with a debugger, previous Windows exploitation, and a intense tolerance for hard work is required.

More Info

Advanced Web Attacks

Advanced Web Attacks and Exploitation

Advanced Web Attacks and Exploitation takes the student deep into the realm of web application penetration testing. From mind-bending XSS attacks, to exploiting race conditions, to advanced SQL injection attacks, Advanced Web Attacks and Exploitation will broaden your knowledge of web application hacking and help you identify and circumvent various protection mechanisms in use on the web today.

More Info