Penetration Testing Training with Kali Linux

Official OSCP Certification Course

  • Become an OSCP after taking this course and passing the 24-hour certification exam
  • The course exposes info security professionals to the latest ethical hacking tools and techniques
  • For hands-on experience, each student receives access to a virtual penetration testing lab where techniques learned within the course can be practiced
  • The OSCP is among the most respected and sought-after designation within the information security space.

Offensive Security Certified Professional (OSCP)

Course Delivery


Accepted Payment Types
Visa, MasterCard, American Express, PayPal

Course Overview

Penetration Testing with Kali (PWK) is a self-paced, online course that introduces students to the latest ethical hacking tools and techniques.  In addition to a traditional course guide and video-based lectures, each student receives access to a virtual penetration testing lab where techniques learned within the course can be practiced in a safe and legal environment. You will learn to conduct a penetration test from start to finish through hands-on experience within a target-rich, diverse, and vulnerable network environment.  Upon successful completion of the course and certification exam, you will officially become an Offensive Security Certified Professional (OSCP), which is among the most respected and sought-after designation within the information security space.

Who is this course for?

This course is designed for information security professionals who want to take a serious and meaningful step into the world of professional penetration testing.  This includes:

  • Pentesters seeking an industry-leading certification
  • Security Professionals
  • Network Administrators

Course Prerequisites

All students are required to have:

  • Solid understanding of TCP/IP networking
  • Reasonable understanding of Linux
  • Familiarity of Bash scripting with basic Python or Perl a plus

Course Overview & Syllabus

PWK is a very unique course that combines traditional course materials teaching the latest ethical hacking tools and techniques with hands-on simulations using a virtual lab environment.  The course covers the following topics in detail.  View the full syllabus.

  • Passive Information Gathering
  • Active Information Gathering
  • Vulnerability Scanning
  • Buffer Overflows
  • Win32 Buffer Overflow Exploitation
  • Linux Buffer Overflow Exploitation
  • Working with Exploits
  • File Transfers
  • Privilege Escalation
  • Client Side Attacks
  • Web Application Attacks
  • Password Attacks
  • Port Redirection and Tunneling
  • The Metasploit Framework
  • Bypassing Antivirus Software
  • Assembling the Pieces: Penetration Test Breakdown

What competencies will you gain?

  • Comfort using multiple information gathering techniques to identify and enumerate targets running various operating systems and services
  • Ability to write basic scripts and tools to aid in the penetration testing process
  • How to analyze, correct, modify, cross-compile, and port public exploit code
  • Ability to successfully conduct both remote and client side attacks
  • Ability to identify and exploit XSS, SQL injection, and file inclusion vulnerabilities in web applications
  • Expertise in deploying tunneling techniques to bypass firewalls
  • Invaluable creative problem solving and lateral thinking skills

Supporting Your Online Journey

8 Hours of Video Series

350 Page Course Guide

Active Student Forums

Access to Virtual Lab Environment

Certification Process

Once you have completed the course and practiced your skills in our labs, you’re ready to take on the arduous 24-hour pen testing certification exam – a real-world, hands-on penetration test that takes place in our isolated VPN exam network – and become an official Offensive Security Certified Professional (OSCP).   The OSCP designation is well-known, highly-respected, and increasingly being demanded across the industry.

Register for PWK Course at least 10 days before you want to start

Step 1

Establish Connection to Virtual Lab

Progress through course materials. Practice in labs.

Schedule certification exam within 90 days of completing course

Successfully complete 24-hour exam and earn your certification

Pricing and Payment

Course Packages Pricing (USD)
Penetration Testing with Kali + 30 days Lab access + OSCP Exam Certification Fee USD 800.00
Penetration Testing with Kali + 60 days Lab access + OSCP Exam Certification Fee USD 1000.00
Penetration Testing with Kali + 90 days Lab access + OSCP Exam Certification Fee USD 1,150.00
OSCP Certification Exam Retake Fee USD 150.00

Accepted forms of payment (More options available during checkout)


You can also purchase additional lab access at anytime during your course.

Lab Extension (# of Days) Cost (USD)
PWK Lab access – extension of 90 days USD 650.00
PWK Lab access – extension of 60 days USD 500.00
PWK Lab access – extension of 30 days USD 300.00
PWK Lab access – extension of 15 days USD 200.00
Upgrade from PWB v.3.0 to PWK USD 200.00
Upgrade from PWB v.2.0 to PWK USD 300.00
Upgrade from PWB v.1.0 to PWK USD 400.00

Live PWK Classes

Penetration Testing Training with Kali Linux Location Enroll Now
TSTC – November 11-15 2019 Netherlands Live Classes: Learn More
Columbia – September 30-October 4 2019 Maryland, USA Live Classes: Learn More

PWK and OSCP Most Frequently Asked Questions

What are the prerequisites for Penetration Testing with Kali Linux?
Which course should I take?
How can I purchase a lab extension?
Can I receive my course materials early?
How can I contact you for live technical support during the course?
What are the prerequisites for Penetration Testing with Kali Linux?

Penetration Testing with Kali Linux is a foundational course, but still requires students to have certain knowledge prior to attending the online class. A solid understanding of TCP/IP, networking, and reasonable Linux skills are required. Familiarity with Bash scripting along with basic Perl or Python is considered a plus.

Which course should I take?

All of our courses focus on offensive security, most specifically, the field of penetration testing. Due to the large number of specializations from the information security domain the most suitable course for you depends on what you are interested in.

Our Penetration Testing with Kali Linux (PWK) course focuses on modern techniques used by penetration testers all across the globe, so it would be a great start for you. Cracking the Perimeter (CTP) focuses on exploit development, web application, and WAN attacks, which are also useful for pentesters; however, PWK teaches you the core skills that are required to be a good pentester. CTP also requires advanced knowledge of different offensive techniques, so it is not recommended for beginners. If you feel you possess the required knowledge to take it, feel free to try the following CTP course registration challenge:

In addition to PWK and CTP, we also have a course entirely devoted to wireless penetration testing, Offensive Security Wireless Attacks (WiFu).

Before registering for a course we advise you to look through each course syllabus and decide which one covers what you are interested in. Each of our courses has a syllabus available online to see what topics are covered. You can view them at the following URLs:

Penetration Testing with Kali Linux (PWK):
Cracking the Perimeter (CTP):
Offensive Security Wireless Attacks (WiFu):
Advanced Windows Exploitation (AWE):
Advanced Web Attacks and Exploitation (AWAE):

How can I purchase a lab extension?

You can purchase a lab extension using your personal purchase link whenever you wish. All of our labs are identical with the same subnets and target IP addresses throughout so there is no updating of documentation required. You will be able to schedule your challenge within 90 days from your lab extension ending date. Please use your unique purchase link in order to make your desired purchase. You will receive your lab account details within a few hours after your payment has been submitted.

Can I receive my course materials early?

It is not possible to receive the course materials prior to your course start date as our courses have been designed to be worked through in the labs as you progress through the materials.

How can I contact you for live technical support during the course?

You can find help and information about our courses, as well as contact our admins through live chat, on our support website available at:

Please see our full Offensive Security FAQ’s page, for more details.

The Only Performance-Based Penetration Testing Training in the Industry

Why settle for less? Join the leading penetration testing course and boost your career with real Penetration Testing skills.

Penetration Testing with Kali Lab Overview

The following graphic is a simplified diagram of the PWK labs. You will initially connect via VPN into the Student Network and hack your way into additional networks as the course progresses. Once you have completed the course videos, you will have the basic skills required to penetrate most of the vulnerable computers in our lab. Certain machines will require additional research and a great deal of determination in order to compromise them.

Please note that all the machines in your lab range are vulnerable to some type of attack/exploit. There are also several vulnerable machines within this range that act as routers, which lead to additional vulnerable networks.  As you progress through the PWK labs, you will discover various hints to machines throughout the lab environment. These hints will show the different relationships present between the machines that will help with specific attack vectors.

PWK Labs Overview


Target Machines:

The lab network contains a large number of machines which range in difficulty. One of the most important skills you will need to learn as a penetration tester is to scan a number of machines and try to find the lowest hanging fruit. The IP addresses of the systems in the lab are not in any specific sequence and you should not start at the lowest target IP address and work your way through the in numerical order. You may not be able to fully compromise a particular network without first moving into another.


Lab Routing:

The IT, Dev, and Admin networks are not directly routable from the Public network but the Public network is routable from all other networks. You will need to use various techniques to gain access to the other networks. Some of these include making use of dual-homed machines or client-side exploits.


Simulated Clients:

The PWK labs contain a number of simulated clients that can be exploited using client side attacks. These clients will do things that any typical human would do in a corporate setting. There are hints and information throughout the lab that will lead you to finding the simulated clients. Doing thorough post-exploitation information gathering may provide indications that target machines are communicating with one another.


Proof.txt Files:

The proof.txt files located on machines throughout the network are provided as a way to prove you have gained access to a particular machine and should be included in your lab report. These files should be seen only as “trophies” and not the end goal to reach. You should still aim to get a shell on the box with the highest level of privileges you possibly can.


PWK Kali VM:

It is highly recommended that you download and use the PWK VMware Virtual Machine image via a link that is provided in your welcome email. This image has a few different modifications compared to the standard ones listed on The PWK VMware image is a custom build of Kali Linux and the course has been fully tested around it. Please note that if you choose not to use the PWK image, you may have issues completing the course material (e.g. Linux Buffer Overflow).

It is also not necessary to update the virtual machine in order to complete the course exercises; however, you are free to do so if you wish. Bear in mind that updating software may introduce new bugs or issues (especially if you have opted to use the “bleeding edge” repo). If you choose to update the VM, we strongly suggest that you create a snapshot of it before upgrading.


Windows 7 Client:

You will be provided with a Windows 7 client machine that has multiple uses while you are in the labs. Some example uses are for the buffer overflow exercises, testing payloads, or compiling Windows exploits.


Lab Documentation:

To deal with the volume of information gathered during a penetration test, we suggest using KeepNote, a multipurpose note-taking application, to initially document all your findings. Using an application like KeepNote helps both in organizing the data digitally as well as mentally. When the penetration test is over, the interim documentation will be used to compile the full report. It doesn’t really matter which program you use for your interim documentation as long as the output is clear and easy to read.

Get used to documenting your work and findings — it’s the only professional way to get the job done!

Final Reporting:

During this course, you will be required to log your findings in the Offensive Security labs and exam. Once you complete the course lab guide and videos, you will be conducting a full-fledged penetration test inside our VPN lab for the THINC.local domain. The report should include, at minimum, the results of all course exercises added as an appendix, an executive summary, and a detailed rundown of all machines. A template for the penetration test report will be provided in both MS Word and Open Office formats. The penetration test report is what you would be presenting to a customer and the content that you decide to put inside your report is ultimately up to you as long as your report is clean and professional.

The OSCP – A Real World Penetration Testing Certification

Learn Penetration Testing online with Kali Linux – the advanced Penetration Testing Training course by Offensive Security which leads towards the OSCP, marking you as an Offensive Security Certified Penetration Tester, with proven hands-on experience in the field.

Penetration Testing with Kali syllabus

To get a more in-depth indication of the course content and objectives of this Advanced Penetration Testing Training, please review the Course Syllabus.

40 (ISC)² CPE Credits

This course may qualify you for 40 (ISC)² CPE Credits after you submit your documentation at the end of the course or pass the certification challenge.

X Close


Certified Pentesting

course starting at
$800 USD

Take Penetration Testing with Kali Linux to gain invaluable penetration testing skills and earn your OSCP.

  • Self-paced, online course
  • Includes certification exam fee
  • Access innovative virtual labs
  • Hands-on experience
  • Become an OSCP

Certified Pentesting

course starting at
$1200 USD

Take Cracking the Perimeter to take your penetration testing skills to expert levels and earn your OSCE.

  • Self-paced, online course
  • Includes certification exam fee
  • Access innovative virtual labs
  • Hands-on experience
  • Become an OSCE


Certified Pentesting
Web Expert

course starting at
$1400 USD

Take Advanced Web Attacks and Exploitation, to deep dive into web apps to earn your OSWE.

  • Self-paced, online course
  • Includes certification exam fee
  • Access innovative virtual labs
  • Hands-on experience
  • Become an OSWE

Certified Pentesting
Wireless Professional

course starting at
$450 USD

Take Offensive Security Wireless Attacks to acquire knowledge about Wi-Fi attacks and earn your OSWP.

  • Self-paced, online course
  • Includes certification exam fee
  • Access innovative virtual labs
  • Hands-on experience
  • Become an OSWP

Certified Exploitation

course starting at
Live Schedule

Take Advanced Windows Exploitation to develop exploits for Windows systems and earn your OSEE.

  • Live training course
  • Includes certification exam fee
  • Maximum instructor interaction
  • Highly challenging
  • Become an OSEE