Penetration Testing Training with Kali Linux
Official OSCP Certification Course
Official OSCP Certification Course
Offensive Security Certified Professional (OSCP)
Accepted Payment Types
Visa, MasterCard, American Express, PayPal
Once you have completed the course and practiced your skills in our labs, you’re ready to take on the arduous 24-hour pen testing certification exam – a real-world, hands-on penetration test that takes place in our isolated VPN exam network – and become an official Offensive Security Certified Professional (OSCP). The OSCP designation is well-known, highly-respected, and increasingly being demanded across the industry.
Register for PWK Course at least 10 days before you want to start
Establish Connection to Virtual Lab
Progress through course materials. Practice in labs.
Schedule certification exam within 90 days of completing course
Successfully complete 24-hour exam and earn your certification
|Course Packages||Pricing (USD)|
|Penetration Testing with Kali + 30 days Lab access + OSCP Exam Certification Fee||USD 800.00|
|Penetration Testing with Kali + 60 days Lab access + OSCP Exam Certification Fee||USD 1000.00|
|Penetration Testing with Kali + 90 days Lab access + OSCP Exam Certification Fee||USD 1,150.00|
|OSCP Certification Exam Retake Fee||USD 60.00|
Accepted forms of payment (More options available during checkout)
You can also purchase additional lab access at anytime during your course.
|Lab Extension (# of Days)||Cost (USD)|
|PWK Lab access – extension of 90 days||USD 600.00|
|PWK Lab access – extension of 60 days||USD 450.00|
|PWK Lab access – extension of 30 days||USD 250.00|
|PWK Lab access – extension of 15 days||USD 150.00|
|Upgrade from PWB v.3.0 to PWK||USD 200.00|
|Upgrade from PWB v.2.0 to PWK||USD 300.00|
|Upgrade from PWB v.1.0 to PWK||USD 400.00|
Penetration Testing with Kali Linux is a foundational course, but still requires students to have certain knowledge prior to attending the online class. A solid understanding of TCP/IP, networking, and reasonable Linux skills are required. Familiarity with Bash scripting along with basic Perl or Python is considered a plus.
All of our courses focus on offensive security, most specifically, the field of penetration testing. Due to the large number of specializations from the information security domain the most suitable course for you depends on what you are interested in.
Our Penetration Testing with Kali Linux (PWK) course focuses on modern techniques used by penetration testers all across the globe, so it would be a great start for you. Cracking the Perimeter (CTP) focuses on exploit development, web application, and WAN attacks, which are also useful for pentesters; however, PWK teaches you the core skills that are required to be a good pentester. CTP also requires advanced knowledge of different offensive techniques, so it is not recommended for beginners. If you feel you possess the required knowledge to take it, feel free to try the following CTP course registration challenge: http://www.fc4.me/
In addition to PWK and CTP, we also have a course entirely devoted to wireless penetration testing, Offensive Security Wireless Attacks (WiFu).
Before registering for a course we advise you to look through each course syllabus and decide which one covers what you are interested in. Each of our courses has a syllabus available online to see what topics are covered. You can view them at the following URLs:
Penetration Testing with Kali Linux (PWK): https://www.offensive-security.com/documentation/penetration-testing-with-kali.pdf
Cracking the Perimeter (CTP): https://www.offensive-security.com/documentation/cracking-the-perimiter-syllabus.pdf
Offensive Security Wireless Attacks (WiFu): https://www.offensive-security.com/documentation/wifu-syllabus.pdf
Advanced Windows Exploitation (AWE): https://www.offensive-security.com/documentation/advanced-windows-exploitation.pdf
Advanced Web Attacks and Exploitation (AWAE): https://www.offensive-security.com/documentation/awae-syllabus.pdf
You can purchase a lab extension using your personal purchase link whenever you wish. All of our labs are identical with the same subnets and target IP addresses throughout so there is no updating of documentation required. You will be able to schedule your challenge within 90 days from your lab extension ending date. Please use your unique purchase link in order to make your desired purchase. You will receive your lab account details within a few hours after your payment has been submitted.
It is not possible to receive the course materials prior to your course start date as our courses have been designed to be worked through in the labs as you progress through the materials.
You can find help and information about our courses, as well as contact our admins through live chat, on our support website available at: https://support.offensive-security.com/
Please see our full Offensive Security FAQ’s page, for more details.
The following graphic is a simplified diagram of the PWK labs. You will initially connect via VPN into the Student Network and hack your way into additional networks as the course progresses. Once you have completed the course videos, you will have the basic skills required to penetrate most of the vulnerable computers in our lab. Certain machines will require additional research and a great deal of determination in order to compromise them.
Please note that all the machines in your lab range are vulnerable to some type of attack/exploit. There are also several vulnerable machines within this range that act as routers, which lead to additional vulnerable networks. As you progress through the PWK labs, you will discover various hints to machines throughout the lab environment. These hints will show the different relationships present between the machines that will help with specific attack vectors.
The lab network contains a large number of machines which range in difficulty. One of the most important skills you will need to learn as a penetration tester is to scan a number of machines and try to find the lowest hanging fruit. The IP addresses of the systems in the lab are not in any specific sequence and you should not start at the lowest target IP address and work your way through the in numerical order. You may not be able to fully compromise a particular network without first moving into another.
The IT, Dev, and Admin networks are not directly routable from the Public network but the Public network is routable from all other networks. You will need to use various techniques to gain access to the other networks. Some of these include making use of dual-homed machines or client-side exploits.
The PWK labs contain a number of simulated clients that can be exploited using client side attacks. These clients will do things that any typical human would do in a corporate setting. There are hints and information throughout the lab that will lead you to finding the simulated clients. Doing thorough post-exploitation information gathering may provide indications that target machines are communicating with one another.
The proof.txt files located on machines throughout the network are provided as a way to prove you have gained access to a particular machine and should be included in your lab report. These files should be seen only as “trophies” and not the end goal to reach. You should still aim to get a shell on the box with the highest level of privileges you possibly can.
It is highly recommended that you download and use the PWK VMware Virtual Machine image via a link that is provided in your welcome email. This image has a few different modifications compared to the standard ones listed on kali.org. The PWK VMware image is a custom build of Kali Linux and the course has been fully tested around it. Please note that if you choose not to use the PWK image, you may have issues completing the course material (e.g. Linux Buffer Overflow).
It is also not necessary to update the virtual machine in order to complete the course exercises; however, you are free to do so if you wish. Bear in mind that updating software may introduce new bugs or issues (especially if you have opted to use the “bleeding edge” repo). If you choose to update the VM, we strongly suggest that you create a snapshot of it before upgrading.
You will be provided with a Windows 7 client machine that has multiple uses while you are in the labs. Some example uses are for the buffer overflow exercises, testing payloads, or compiling Windows exploits.
To deal with the volume of information gathered during a penetration test, we suggest using KeepNote, a multipurpose note-taking application, to initially document all your findings. Using an application like KeepNote helps both in organizing the data digitally as well as mentally. When the penetration test is over, the interim documentation will be used to compile the full report. It doesn’t really matter which program you use for your interim documentation as long as the output is clear and easy to read.
Get used to documenting your work and findings — it’s the only professional way to get the job done!
During this course, you will be required to log your findings in the Offensive Security labs and exam. Once you complete the course lab guide and videos, you will be conducting a full-fledged penetration test inside our VPN lab for the THINC.local domain. The report should include, at minimum, the results of all course exercises added as an appendix, an executive summary, and a detailed rundown of all machines. A template for the penetration test report will be provided in both MS Word and Open Office formats. The penetration test report is what you would be presenting to a customer and the content that you decide to put inside your report is ultimately up to you as long as your report is clean and professional.
Learn Penetration Testing online with Kali Linux – the advanced Penetration Testing Training course by Offensive Security which leads towards the OSCP, marking you as an Offensive Security Certified Penetration Tester, with proven hands-on experience in the field.
To get a more in-depth indication of the course content and objectives of this Advanced Penetration Testing Training, please review the Course Syllabus.
This course may qualify you for 40 (ISC)² CPE Credits after you submit your documentation at the end of the course or pass the certification challenge.