- OSCP is the most well-recognized and respected certification for info security professionals
- To become certified, you must complete Offensive Security’s Penetration Testing with Kali Linux (PwK) course and pass the 24-hour hands-on exam
- An OSCP has mastered a comprehensive and practical understanding of the penetration testing process
Penetration Testing with Kali Linux
24-hrs to execute attacks within virtual network and submit report
Real World Exams
The OSCP examination consists of a virtual network containing targets of varying configurations and operating systems. At the start of the exam, the student receives the exam and connectivity instructions for an isolated exam network that they have no prior knowledge or exposure to.
The successful examinee will demonstrate their ability to research the network (information gathering), identify any vulnerabilities and successfully execute attacks. This often includes modifying exploit code with the goal to compromise the systems and gain administrative access.
The candidate is expected to submit a comprehensive penetration test report, containing in-depth notes and screenshots detailing their findings. Points are awarded for each compromised host, based on their difficulty and level of access obtained.
Real World Benefits
An OSCP, by definition, is able to identify existing vulnerabilities and execute organized attacks in a controlled and focused manner, write simple Bash or Python scripts, modify existing exploit code to their advantage, perform network pivoting and data ex-filtration, and compromise poorly written PHP web applications.
The twenty-four-hour examination also demonstrates that OSCPs have a certain degree of persistence and determination. Perhaps more importantly, an OSCP has demonstrated their ability to think “outside the box” and “laterally.”
The only way to take the OSCP certification exam is to first complete the Penetration Testing with Kali Linux training course, where students learn to identify and exploit a wide array of operating systems in our vast online VPN lab network.
OSCP HOLDERS CAN
- Use multiple information gathering techniques to identify and enumerate targets running various operating systems and services.
- Write basic scripts and tools to aid in the penetration testing process.
- Analyze, correct, modify, cross-compile, and port public exploit code.
- Successfully conduct both remote and client side attacks.
- Identify and exploit XSS, SQL injection, and file inclusion vulnerabilities in web applications.
- Deploy tunneling techniques to bypass firewalls.
- Demonstrate creative problem solving and lateral thinking
I learned so much during the course and earned what I feel is a cert worth its weight in gold. As I have mentioned in previous blog posts, I take pride in guiding my professional development and I felt that taking a hands-on penetration testing course would be a great challenge and learning experience. – Mike Boya
PWK and OSCP Most Frequently Asked Questions
What are the prerequisites for Penetration Testing with Kali Linux?
Penetration Testing with Kali Linux is a foundational course, but still requires students to have certain knowledge prior to attending the online class. A solid understanding of TCP/IP, networking, and reasonable Linux skills are required. Familiarity with Bash scripting along with basic Perl or Python is considered a plus.
Which course should I take?
All of our courses focus on offensive security, most specifically, the field of penetration testing. Due to the large number of specializations from the information security domain the most suitable course for you depends on what you are interested in.
Our Penetration Testing with Kali Linux (PWK) course focuses on modern techniques used by penetration testers all across the globe, so it would be a great start for you. Cracking the Perimeter (CTP) focuses on exploit development, web application, and WAN attacks, which are also useful for pentesters; however, PWK teaches you the core skills that are required to be a good pentester. CTP also requires advanced knowledge of different offensive techniques, so it is not recommended for beginners. If you feel you possess the required knowledge to take it, feel free to try the following CTP course registration challenge: http://www.fc4.me/
In addition to PWK and CTP, we also have a course entirely devoted to wireless penetration testing, Offensive Security Wireless Attacks (WiFu).
Before registering for a course we advise you to look through each course syllabus and decide which one covers what you are interested in. Each of our courses has a syllabus available online to see what topics are covered. You can view them at the following URLs:
Penetration Testing with Kali Linux (PWK): https://www.offensive-security.com/documentation/penetration-testing-with-kali.pdf
Cracking the Perimeter (CTP): https://www.offensive-security.com/documentation/cracking-the-perimiter-syllabus.pdf
Offensive Security Wireless Attacks (WiFu): https://www.offensive-security.com/documentation/wifu-syllabus.pdf
Advanced Windows Exploitation (AWE): https://www.offensive-security.com/documentation/advanced-windows-exploitation.pdf
Advanced Web Attacks and Exploitation (AWAE): https://www.offensive-security.com/documentation/awae-syllabus.pdf
How can I purchase a lab extension?
You can purchase a lab extension using your personal purchase link whenever you wish. All of our labs are identical with the same subnets and target IP addresses throughout so there is no updating of documentation required. You will be able to schedule your challenge within 90 days from your lab extension ending date. Please use your unique purchase link in order to make your desired purchase. You will receive your lab account details within a few hours after your payment has been submitted.
Can I receive my course materials early?
It is not possible to receive the course materials prior to your course start date as our courses have been designed to be worked through in the labs as you progress through the materials.
How can I contact you for live technical support during the course?
You can find help and information about our courses, as well as contact our admins through live chat, on our support website available at: https://support.offensive-security.com/
Please see our full Offensive Security FAQ’s page, for more details.
OSCP Certification Reviews
The OSCP certification, in my opinion, proves that its holder is able to identify vulnerabilities, create and modify exploit code, exploit hosts, and successfully preform tasks on the compromised systems over various operating systems.
The truism “anything worth having doesn’t come easy” is one I have often remembered when on a particularly difficult path to a goal. Never have the words rung quite so true when applied to my quest for [the] OSCP certification.