The most intense penetration testing course available in the security industry.
Penetration Testing Training with Kali Linux
How Does the Online Security Training Work?
Register & Download
We begin a new PWK course every Sunday with seats filling up rapidly, so we recommend that students begin their registration at least 10 days prior to their desired start date. The VPN lab access begins on your course start date and is a continuous block of time.
The online penetration testing labs are accessed via a VPN connection, so all students must have a high-speed Internet connection. In order to ensure a quality lab experience, you will be required to conduct a VPN connectivity test prior to making payment.
On your assigned course start date, you’ll be provided access to download all your course materials, including the 8-hour Offensive Security PWK course video series in HTML/Flash format and the 350-page PWK lab guide. You will also receive instructions on how to connect to our virtual penetration testing labs.
Connect to the Labs
When your course begins, you are provided with VPN access to our vast pen testing labs and are given access to a dedicated Windows virtual machine. You will use this access to complete various exercises and practice concepts from the PWK course.
As you progress through the PWK course materials, you will practice the tools and techniques directly on various targets within our online virtual labs. You will then make use of your new-found skills and techniques to help you conduct a penetration test of the entire virtual lab environment.
Successfully exploiting all of the lab systems requires a great deal of research, tenacity, and the willingness to Try Harder. However, you are not on your own; our student administrators are readily available to provide you with live support and the occasional nudge to help push you in the right direction when you’re out of options.
The OSCP Certification
The Offensive Security Certified Professional (OSCP) is the companion certification for Penetration Testing with Kali Linux. The OSCP exam challenges you to prove you have a clear and practical understanding of the penetration testing process and life-cycle.
Once you have completed the course and practiced your skills in our labs, you’re ready to take on the arduous 24-hour OSCP pen testing certification exam – a real-world, hands-on penetration test that takes place in our isolated VPN exam network.
You will have 90 days from the end of your lab time to schedule and take this most unique and challenging of ethical hacking certification exams. The OSCP certification is very challenging and not for the faint-of-heart. However, earning it is incredibly rewarding and proves to yourself and others that you have proven, practical penetration testing skills.
PWK and OSCP Most Frequently Asked Questions
What are the prerequisites for Penetration Testing with Kali Linux?
Penetration Testing with Kali Linux is a foundational course, but still requires students to have certain knowledge prior to attending the online class. A solid understanding of TCP/IP, networking, and reasonable Linux skills are required. Familiarity with Bash scripting along with basic Perl or Python is considered a plus.
Which course should I take?
All of our courses focus on offensive security, most specifically, the field of penetration testing. Due to the large number of specializations from the information security domain the most suitable course for you depends on what you are interested in.
Our Penetration Testing with Kali Linux (PWK) course focuses on modern techniques used by penetration testers all across the globe, so it would be a great start for you. Cracking the Perimeter (CTP) focuses on exploit development, web application, and WAN attacks, which are also useful for pentesters; however, PWK teaches you the core skills that are required to be a good pentester. CTP also requires advanced knowledge of different offensive techniques, so it is not recommended for beginners. If you feel you possess the required knowledge to take it, feel free to try the following CTP course registration challenge: http://www.fc4.me/
In addition to PWK and CTP, we also have a course entirely devoted to wireless penetration testing, Offensive Security Wireless Attacks (WiFu).
Before registering for a course we advise you to look through each course syllabus and decide which one covers what you are interested in. Each of our courses has a syllabus available online to see what topics are covered. You can view them at the following URLs:
Penetration Testing with Kali Linux (PWK): https://www.offensive-security.com/documentation/penetration-testing-with-kali.pdf
Cracking the Perimeter (CTP): https://www.offensive-security.com/documentation/cracking-the-perimiter-syllabus.pdf
Offensive Security Wireless Attacks (WiFu): https://www.offensive-security.com/documentation/wifu-syllabus.pdf
Advanced Windows Exploitation (AWE): https://www.offensive-security.com/documentation/advanced-windows-exploitation.pdf
Advanced Web Attacks and Exploitation (AWAE): https://www.offensive-security.com/documentation/awae-syllabus.pdf
How can I purchase a lab extension?
You can purchase a lab extension using your personal purchase link whenever you wish. All of our labs are identical with the same subnets and target IP addresses throughout so there is no updating of documentation required. You will be able to schedule your challenge within 90 days from your lab extension ending date. Please use your unique purchase link in order to make your desired purchase. You will receive your lab account details within a few hours after your payment has been submitted.
Can I receive my course materials early?
It is not possible to receive the course materials prior to your course start date as our courses have been designed to be worked through in the labs as you progress through the materials.
How can I contact you for live technical support during the course?
You can find help and information about our courses, as well as contact our admins through live chat, on our support website available at: https://support.offensive-security.com/
Please see our full Offensive Security FAQ’s page, for more details.
The following graphic is a simplified diagram of the PWK labs. You will initially connect via VPN into the Student Network and hack your way into additional networks as the course progresses. Once you have completed the course videos, you will have the basic skills required to penetrate most of the vulnerable computers in our lab. Certain machines will require additional research and a great deal of determination in order to compromise them.
Please note that all the machines in your lab range are vulnerable to some type of attack/exploit. There are also several vulnerable machines within this range that act as routers, which lead to additional vulnerable networks. As you progress through the PWK labs, you will discover various hints to machines throughout the lab environment. These hints will show the different relationships present between the machines that will help with specific attack vectors.
The lab network contains a large number of machines which range in difficulty. One of the most important skills you will need to learn as a penetration tester is to scan a number of machines and try to find the lowest hanging fruit. The IP addresses of the systems in the lab are not in any specific sequence and you should not start at the lowest target IP address and work your way through the in numerical order. You may not be able to fully compromise a particular network without first moving into another.
The IT, Dev, and Admin networks are not directly routable from the Public network but the Public network is routable from all other networks. You will need to use various techniques to gain access to the other networks. Some of these include making use of dual-homed machines or client-side exploits.
The PWK labs contain a number of simulated clients that can be exploited using client side attacks. These clients will do things that any typical human would do in a corporate setting. There are hints and information throughout the lab that will lead you to finding the simulated clients. Doing thorough post-exploitation information gathering may provide indications that target machines are communicating with one another.
The proof.txt files located on machines throughout the network are provided as a way to prove you have gained access to a particular machine and should be included in your lab report. These files should be seen only as “trophies” and not the end goal to reach. You should still aim to get a shell on the box with the highest level of privileges you possibly can.
PWK Kali VM:
It is highly recommended that you download and use the PWK VMware Virtual Machine image via a link that is provided in your welcome email. This image has a few different modifications compared to the standard ones listed on kali.org. The PWK VMware image is a custom build of Kali Linux and the course has been fully tested around it. Please note that if you choose not to use the PWK image, you may have issues completing the course material (e.g. Linux Buffer Overflow).
It is also not necessary to update the virtual machine in order to complete the course exercises; however, you are free to do so if you wish. Bear in mind that updating software may introduce new bugs or issues (especially if you have opted to use the “bleeding edge” repo). If you choose to update the VM, we strongly suggest that you create a snapshot of it before upgrading.
Windows 7 Client:
You will be provided with a Windows 7 client machine that has multiple uses while you are in the labs. Some example uses are for the buffer overflow exercises, testing payloads, or compiling Windows exploits.
To deal with the volume of information gathered during a penetration test, we suggest using KeepNote, a multipurpose note-taking application, to initially document all your findings. Using an application like KeepNote helps both in organizing the data digitally as well as mentally. When the penetration test is over, the interim documentation will be used to compile the full report. It doesn’t really matter which program you use for your interim documentation as long as the output is clear and easy to read.
Get used to documenting your work and findings — it’s the only professional way to get the job done!
During this course, you will be required to log your findings in the Offensive Security labs and exam. Once you complete the course lab guide and videos, you will be conducting a full-fledged penetration test inside our VPN lab for the THINC.local domain. The report should include, at minimum, the results of all course exercises added as an appendix, an executive summary, and a detailed rundown of all machines. A template for the penetration test report will be provided in both MS Word and Open Office formats. The penetration test report is what you would be presenting to a customer and the content that you decide to put inside your report is ultimately up to you as long as your report is clean and professional.
The OSCP – A Real World Penetration Testing Certification
Learn Penetration Testing online with Kali Linux – the advanced Penetration Testing Training course by Offensive Security which leads towards the OSCP, marking you as an Offensive Security Certified Penetration Tester, with proven hands-on experience in the field.
Penetration Testing with Kali syllabus
To get a more in-depth indication of the course content and objectives of this Advanced Penetration Testing Training, please review the Course Syllabus.
40 (ISC)² CPE Credits
This course may qualify you for 40 (ISC)² CPE Credits after you submit your documentation at the end of the course or pass the certification challenge.
|Item||Price in USD|
|Penetration Testing with Kali + 30 days Lab access + Certification||USD 800.00|
|Penetration Testing with Kali + 60 days Lab access + Certification||USD 1000.00|
|Penetration Testing with Kali + 90 days Lab access + Certification||USD 1,150.00|
|PWK Lab access – extension of 90 days||USD 600.00|
|PWK Lab access – extension of 60 days||USD 450.00|
|PWK Lab access – extension of 30 days||USD 250.00|
|PWK Lab access – extension of 15 days||USD 150.00|
|Upgrade from PWB v.3.0 to PWK||USD 200.00|
|Upgrade from PWB v.2.0 to PWK||USD 300.00|
|Upgrade from PWB v.1.0 to PWK||USD 400.00|
|OSCP – Certification retake||USD 60.00|
Penetration Testing with Kali Linux Reviews
This was the most fun and challenging course I’ve ever taken. It’s also the most satisfying because although the course material is excellent, much of what you accomplish is due to your own hard work and commitment to Try Harder! I learned a lot and I can’t recommend it enough for anyone that wants to wants to hone their pen-testing skills – Read OSCP Review