Course Overview

Penetration Testing with Kali Linux is the foundational course at Offensive Security. Those new to OffSec or penetration testing should start here.

This online ethical hacking course is self-paced. It introduces penetration testing tools and techniques via hands-on experience. PWK trains not only the skills, but also the mindset required to be a successful penetration tester.

Students who complete the course and pass the exam earn the coveted Offensive Security Certified Professional (OSCP) certification.

Live training is also available. Find out the next available locations and dates in the Live Courses section.

Timer

Course includes a 24-hour exam.

Hacker

Learn ethical hacking tools and techniques.

Labs

Gain access to a virtual penetration testing lab.

OSCP Cert

Earn your OSCP certification.

Certification Process

Once you’ve completed the course and practiced your skills in the labs, you’re ready to take the 24-hour certification exam. The exam consists of a hands-on penetration test that takes place in our isolated VPN exam network. A passing exam grade will declare you an Offensive Security Certified Professional (OSCP). The OSCP designation is well known, highly-respected, and a certification requirement for many of the industry’s top positions.

Cart

Register at least 10 days prior to desired start date.

Labs

Establish connection to the virtual lab.

Book

Progress through course materials and practice your skills.

calendar

Schedule certification exam within 90 days of course completion.

OSCP Cert

Successfully complete 24-hour exam and earn your OSCP.

Course Details

Who is this course for?

This course is designed for information security professionals who want to take a serious and meaningful step into the world of professional penetration testing. This includes:

  • Pentesters seeking an industry-leading certification
  • Security professionals
  • Network administrators
  • Other technology professionals

 

Course Overview & Syllabus

PWK is a unique course that combines traditional course materials with hands-on simulations, using a virtual lab environment. The course covers the following topics in detail. View the full syllabus.

  • Passive Information Gathering
  • Active Information Gathering
  • Vulnerability Scanning
  • Buffer Overflows
  • Win32 Buffer Overflow Exploitation
  • Linux Buffer Overflow Exploitation
  • Working with Exploits
  • File Transfers
  • Privilege Escalation
  • Client Side Attacks
  • Web Application Attacks
  • Password Attacks
  • Port Redirection and Tunneling
  • The Metasploit Framework
  • Bypassing Antivirus Software
  • Assembling the Pieces: Penetration Test Breakdown
Course Prerequisites

All students are required to have:

  • Solid understanding of TCP/IP networking
  • Reasonable understanding of Linux
  • Familiarity of Bash scripting with basic Python or Perl a plus

 

What competencies will you gain?
  • Using information gathering techniques to identify and enumerate targets running various operating systems and services
  • Writing basic scripts and tools to aid in the penetration testing process
  • Analyzing, correcting, modifying, cross-compiling, and porting public exploit code
  • Conducting both remote and client side attacks
  • Identifying and exploiting XSS, SQL injection, and file inclusion vulnerabilities in web applications
  • Deploying tunneling techniques to bypass firewalls
  • Creative problem solving and lateral thinking skills

 

Supporting your Online Journey
  • 8-hour video series
  • 350-page course guide
  • Active student forums
  • Access to virtual lab environment

Course Pricing

 

Live Courses

TSTC – November 11-15 2019

Location: Netherlands

Enroll Now

Are You Ready?

Prove Yourself