Home » Programs » Certification » Offensive Security » OSCP

Penetration Testing with Kali Linux
Penetration Testing with Kali Linux (PWK/PEN-200) course just got even better with the addition of five recently retired OSCP exam machines to PWK labs. These five machines represent an entire OSCP exam room! Get more value out of your lab time for the same price, and enjoy extra preparation for the OSCP exam. This online ethical hacking course is self-paced. It introduces penetration testing tools and techniques via hands-on experience. PEN-200 trains not only the skills, but also the mindset required to be a successful penetration tester. Students who complete the course and pass the exam earn the coveted Offensive Security Certified Professional (OSCP) certification.
Course Information
Benefits
- Access to recently retired OSCP exam machines –Â new!
- Introduction into the latest hacking tools and techniques
- Training from the experts behind Kali Linux
- Learn the “Try Harder” method and mindset
- Earn the industry-leading OSCP certification
About the exam
- The PEN-200 course and online lab prepares you for
the OSCP certification - 24-hour exam
- Proctored
- Learn more about the exam
Who is the course for?
- Infosec professionals transitioning into penetration testing
- Pentesters seeking an industry-leading certification
- Security professionals
- Network administrators
- Other technology professionals
Course prerequisites
   All students are required to have:
- Solid understanding of TCP/IP networking
- Reasonable Windows and Linux administration experience
- Familiarity with basic Bash and/or Python scripting
Course Detail
- Using information gathering techniques to identify and enumerate targets running various operating systems and services
- Writing basic scripts and tools to aid in the penetration testing process
- Analyzing, correcting, modifying, cross-compiling, and porting public exploit code
- Conducting remote, local privilege escalation, and client-side attacks
- Identifying and exploiting XSS, SQL injection, and file inclusion vulnerabilities in web applications
- Leveraging tunneling techniques to pivot between networks
- Creative problem solving and lateral thinking skills
- 17+ hours of video
- 850-page PDF course guide
- Over 70 machines, including recently retired OSCP exam machines
- Active student forums
- Access to virtual lab environment
- Closed Captioning is available for this course
PEN-200 is a unique course that combines traditional course materials with hands-on simulations, using a virtual lab environment. The course covers the following topics. View the full syllabus.
- Penetration Testing: What You Should Know
- Getting Comfortable with Kali Linux
- Command Line Fun
- Practical Tools
- Bash Scripting
- Passive Information Gathering
- Active Information Gathering
- Vulnerability Scanning
- Web Application Attacks
- Introduction to Buffer Overflows
- Windows Buffer Overflows
- Linux Buffer Overflows
- Client-Side Attacks
- Locating Public Exploits
- Fixing Exploits
- File Transfers
- Antivirus Evasion
- Privilege Escalation
- Password Attacks
- Port Redirection and Tunneling
- Active Directory Attacks
- The Metasploit Framework
- PowerShell Empire
- Assembling the Pieces: Penetration Test Breakdown
- Trying Harder: The Labs
Request more information?

Supporting Enterprises Around the Globe
Our programs are designed to give you the skills you need to be successful in your career.

GET IN TOUCH WITH OUR EXPERTS
Let us know your areas of interest so that we can serve you better.