Offensive Security experts guide your team in earning the industry-leading OSCP certification with virtual training and mentoring through OffSec Academy. By providing personalized 1:1 attention, this program is the most interactive opportunity for working through the PWK online course.
- Penetration Testing: What You Should Know
- Getting Comfortable with Kali Linux
- Command Line Fun
- Practical Tools
- Bash Scripting
- Passive Information Gathering
- Active Information Gathering
- Vulnerability Scanning
- Web Application Attacks
- Introduction to Buffer Overflows
- Windows Buffer Overflows
- Linux Buffer Overflows
- Client-Side Attacks
- Locating Public Exploits
- Fixing Exploits
- File Transfers
- Antivirus Evasion
- Privilege Escalation
- Password Attacks
- Port Redirection and Tunneling
- Active Directory Attacks
- The Metasploit Framework
- PowerShell Empire
- Assembling the Pieces: Penetration Test Breakdown
- Trying Harder: The Lab
Students who complete the 13-week customized course develop a deep understanding of penetration testing tools and methodologies, as well as the Try Harder mindset. Trust OffSec to be your partner in ensuring your organization is ready and able to identify vulnerabilities.
The course includes:
- Enrollment in the Penetration Testing with Kali Linux (PWK) course
- 1:1 mentoring sessions
- 90 days of lab access
- OSCP certification exam attempt with priority scheduling
- Small-group virtual instruction and demos
- Weekly cohort meetings
- Capture the Flag event with course cohorts
Learning Objectives
- Using information gathering techniques to identify and enumerate targets running various operating systems and services
- Writing basic scripts and tools to aid in the penetration testing process
- Analyzing, correcting, modifying, cross-compiling, and porting public exploit code
- Conducting remote, local privilege escalation, and client-side attacks
- Identifying and exploiting XSS, SQL injection, and file inclusion vulnerabilities in web applications
- Leveraging tunneling techniques to pivot between networks
- Creative problem solving and lateral thinking skills
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Cyber Investigation
- Digital Forensics
- Exploitation Analysis
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.