COURSE

Offensive Penetration Testing Certification Training

Course

As a pentester, you need to understand the methods of real-life attackers and use the tools, techniques, and resources they exploit. Join ethical hacker Clint Kehr as he guides you from basic hacking concepts to advanced exploitation techniques in this Offensive Penetration Testing Course. Develop the hacker mindset or hone your existing skills.
Full access included with 
Insider Pro
 and 
Teams

21

H

49

M
Time

intermediate

i
Designed for learners who have no prior work experience in IT or Cybersecurity, but are interested in starting a career in this exciting field.
Designed for learners with prior cybersecurity work experience who are interested in advancing their career or expanding their skillset.
Designed for learners with a solid grasp of foundational IT and cybersecurity concepts who are interested in pursuing an entry-level security role.
Experience Level

22

i

Earn qualifying credits for certification renewal with completion certificates provided for submission.
CEU's

Enrollees

Learners at 96% of Fortune 1000 companies trust Cybrary

About this course

Read More

Skills you'll gain

Course Outline

1
Course Introduction
0
H
13
Min
1
Setting the Foundation for Success
0
H
32
Min
1
Kali Linux Basics
2
H
21
Min
1
Understanding Network Protocols
3
H
25
Min
1
Web Application Penetration Testing
3
H
46
Min
1
Introduction to Buffer Overflow
2
H
9
Min
1
Public Exploits
2
H
20
Min
1
Getting a Shell, Now What?
0
H
33
Min
1
Privilege Escalation
2
H
16
Min
1
Password Cracking and Brute-Forcing Logins
2
H
12
Min
1
Putting it All Together
1
H
49
Min
1
Developing the Hacker Mindset
0
H
15
Min

Hands-on Penetration Test Lab

Free

1m

Introduction to Password Cracking Tools

Free

7m

Linux Privilege Escalation

Free

9m

The Different Types of Shells

Free

10m

Where to Look for Public Exploits

Free

8m

How to Practice Buffer Overflows

Free

5m

Setting up the Kali Linux VM

Free

13m

Understanding the Penetration Test Report

Free

10m

Understanding the Hacker Mindset

Free

7m

Hands-on Penetration Test Lab Walkthrough

Free

10m

Windows Privilege Escalation

Free

10m

Introduction to Login Brute-Forcing Tools

Free

4m

How to Upgrade a Shell

Free

8m

Understanding the Code

Free

8m

Setting up the Environment

Free

5m

Using Intercepting Proxies Part 1

Free

8m

Scanning with Nmap

Free

8m

Course Overview

Free

10m

Overview of Tools in Kali Linux

Free

10m

Penetration Test Report Demo

Free

4m

Tips on Harnessing the Hacker Mindset

Free

7m

Writing the Report

Free

8m

Password Brute-Forcing Web Logins

Free

10m

A Word on Privilege Escalation Enumeration Scripts

Free

5m

Transferring Files to and from Kali Linux

Free

7m

Modifying the Code to Fit the Environment

Free

7m

Fuzzing the Application

Free

8m

Using Intercepting Proxies Part 2

Free

10m

Scanning with Masscan

Free

7m

Understanding the Command Line

Free

9m

Note Taking and Mind Mapping

Free

8m

Offensive Penetration Testing Practice Exam

Free

2m

Password Brute-Forcing Tips

Free

12m

Privilege Escalation Lab

Free

2m

Transferring Files Demo

Free

8m

Introduction to Metasploit

Free

12m

Finding Bad Characters

Free

4m

SQL Injections

Free

11m

Scanning with Netcat

Free

10m

Who, What, When, Where and How of the Linux Command Line

Free

7m

Finding Resources to Prepare for the Offensive Penetration Testing

Free

10m

Brute-Force and Password Cracking Lab

Free

1m

Privilege Escalation Walkthrough: Windows

Free

11m

Using Metasploit or Not

Free

8m

Finding the Return Address

Free

5m

SQL Injection Authentication Bypass

Free

6m

Using Wireshark

Free

5m

Windows Command Lab

Free

7m

Brute-Force and Password Cracking Lab Walkthrough

Free

9m

Privilege Escalation Walkthrough: Linux

Free

8m

Public Exploit Lab

Free

1m

Getting a Shell

Free

5m

Cross-Site Scripting (XSS)

Free

10m

Wireshark and Encrypted Traffic

Free

5m

Command Line Lab

Free

2m

Public Exploit Lab Walkthrough

Free

7m

Buffer Overflow Lab

Free

4m

BeEF Framework Demo

Free

7m

Weaponizing Wireshark

Free

6m

Command Line Lab Walkthrough

Free

5m

Offensive Penetration Testing - Study Break!

Free

2m

File Inclusion Vulnerabilities

Free

9m

SMB Enumeration

Free

7m

File Inclusion Demo

Free

5m

SMB Enumeration Demo

Free

11m

File Upload Vulnerabilities

Free

6m

NFS Enumeration

Free

7m

XXE Attacks

Free

11m

SMTP Enumeration

Free

5m

Content Management Systems

Free

8m

SNMP Enumeration

Free

6m

Content Management Systems Demo

Free

8m

FTP Enumeration

Free

4m

Web Application Lab

Free

1m

FTP Enumeration Demo

Free

8m

Web Application Lab Walkthrough

Free

19m

SSH Enumeration

Free

13m

Protocol Tips

Free

8m

Network Protocols Lab

Free

1m

Hands-on Penetration Test Lab

1m

Putting it All Together
Introduction to Password Cracking Tools

7m

Password Cracking and Brute-Forcing Logins
Linux Privilege Escalation

9m

Privilege Escalation
The Different Types of Shells

10m

Getting a Shell, Now What?
How to Practice Buffer Overflows

5m

Introduction to Buffer Overflow
Understanding the Penetration Test Report

10m

Setting the Foundation for Success
Understanding the Hacker Mindset

7m

Developing the Hacker Mindset
Introduction to Login Brute-Forcing Tools

4m

Password Cracking and Brute-Forcing Logins
How to Upgrade a Shell

8m

Getting a Shell, Now What?
Setting up the Environment

5m

Introduction to Buffer Overflow
Using Intercepting Proxies Part 1

8m

Web Application Penetration Testing
Scanning with Nmap

8m

Understanding Network Protocols
Course Overview

10m

Course Introduction
Penetration Test Report Demo

4m

Setting the Foundation for Success
Tips on Harnessing the Hacker Mindset

7m

Developing the Hacker Mindset
Writing the Report

8m

Putting it All Together
Password Brute-Forcing Web Logins

10m

Password Cracking and Brute-Forcing Logins
Course Description

This Offensive Penetration Testing (OSCP) training will primarily be hands-on and build familiarity from basic hacking concepts to more advanced exploitation techniques, while also demonstrating through video lectures to teach learners penetration testing methodologies and tools. The course will cover how to set up Kali Linux and use the tools within it to perform a penetration test by learning how to scan targets, conduct enumeration to find vulnerabilities within networks as well as web applications, modify exploit code to fit the environment to successfully exploit the target, obtain a shell on a target, and then escalate privileges to successfully “own” a target all in a controlled and organized manner in preparation to write a comprehensive penetration test report. Learners will also become familiar with how to write the penetration test report as this is an equally important requirement for their pentesting career. This course will also help learners develop the hacker mindset of how to think laterally and with agility while under stress and a time limit in order to successfully exploit targets. This course is equally beneficial for those with a basic level of knowledge of penetration testing and want more hands-on experience to hone their skills.

This is a deep course about penetration testing. In this OSCP training course, you’ll learn from basic to the most advanced and modern techniques to find vulnerabilities through information gathering, create and/or use exploits and be able to escalate privileges in order to test your information systems defenses.

Prerequisites for this OSCP Training Online

  • Solid understanding of TCP/IP networking
  • Reasonable Windows and Linux administration experience
  • Familiarity with the Windows and Linux command line
  • Familiarity of Bash scripting with basic Python
  • Course Goals

    By the end of this course, students should be able to:

  • Set up Kali Linux and understand the tools it has available
  • Conduct a full penetration test
  • Write a comprehensive penetration test report
  • Understand what the hacker mindset is and help develop it
  • What Is Offensive Security (OSCP)?

    Offensive security allows developers to find vulnerabilities within a system or application by gathering information. Then, the developer creates exploits to escalate privileges in order to test the information systems’ defenses.

    Think of offensive security as a proactive approach to protecting websites and applications. Offensive security training provides developers with penetration testing methodologies and provides them with the knowledge to utilize the tools included with the Kali Linux distribution.

    How Do You Prepare For an Offensive Penetration Testing Certification?

    Before pursuing an offensive penetration testing certification, having specific prerequisites will help you successfully complete the course. Students should have a robust IT Background, InfoSec knowledge, ethical Hacking knowledge, and basic programming skills.

    How Do You Pass an Offensive Penetration Testing Certification?

    The best way to earn the offensive penetration testing certification is to take an online course such as Cybrary’s offensive security training course.

    Cybrary’s course allows students to take the course online, which allows for flexibility to start and stop the videos when it’s convenient for students. Cybrary’s offensive security training will enable students to practice pen tests in a lab and erase their tracks in Labs.

    Is an Offensive Penetration Testing Certification Worth It?

    By the end of this offensive security training course, students will understand how to use passive and active reconnaissance techniques, as well as use basic and advanced scanning and information harvesting techniques. The goal is for developers to be able to create code to exploit vulnerabilities and recognize legitimate public exploits from fake exploits.

    Upon obtaining OSCP certification, students will also be able to:

  • Use and modify public exploits
  • Use several techniques to gain access to a system from both remote and local side
  • Use several methods to escalate privileges
  • Clear your tracks
  • Perform lateral and vertical jumps between systems
  • Use tunnels to compromise other computers on the network or hide your traffic.
  • OSCP training online will help developers in their careers by giving them the skills needed to create executive reports with the results of the pen test and present the findings to your managers.

    What Should I Do After The OSCP Training Online?

    Once you’ve finished this OSCP training, it’s time to utilize your knowledge and skills in the professional world. Having offensive penetration skills on your resume can help you advance your career and earn a coveted role.

    Train Your Team

    Cybrary’s expert-led cybersecurity courses help your team remediate skill gaps and get up-to-date on certifications. Utilize Cybrary to stay ahead of emerging threats and provide team members with clarity on how to learn, grow, and advance their careers within your organization.

    Included in a Path

    Instructors

    Clint Kehr
    Ethical Hacker
    Read Full Bio
    Learn

    Learn core concepts and get hands-on with key skills.

    Practice

    Exercise your problem-solving and creative thinking skills with security-centric puzzles

    Prove

    Assess your knowledge and skills to identify areas for improvement and measure your growth

    Get Hands-on Learning

    Put your skills to the test in virtual labs, challenges, and simulated environments.

    Measure Your Progress

    Track your skills development from lesson to lesson using the Cybrary Skills Tracker.

    Connect with the Community

    Connect with peers and mentors through our supportive community of cybersecurity professionals.

    Success from Our Learners

    "Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

    Don Gates

    Principal Systems Engineer/SAIC

    "Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

    Cory

    Cybersecurity analyst/

    "I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

    Mike

    Security Engineer and Pentester/

    "Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

    Don Gates

    Principal Systems Engineer/SAIC

    "Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

    Cory

    Cybersecurity analyst/

    "I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

    Mike

    Security Engineer and Pentester/

    "Becoming a Cybrary Insider Pro was a total game changer. Cybrary was instrumental in helping me break into cybersecurity, despite having no prior IT experience or security-related degree. Their career paths gave me clear direction, the instructors had real-world experience, and the virtual labs let me gain hands-on skills I could confidently put on my resume and speak to in interviews."

    Cassandra

    Information Security Analyst/Cisco Systems

    "I was able to earn both my Security+ and CySA+ in two months. I give all the credit to Cybrary. I’m also proud to announce I recently accepted a job as a Cyber Systems Engineer at BDO... I always try to debunk the idea that you can't get a job without experience or a degree."

    Casey

    Cyber Systems Engineer/BDO

    "Cybrary has helped me improve my hands-on skills and pass my toughest certification exams, enabling me to achieve 13 advanced certifications and successfully launch my own business. I love the practice tests for certification exams, especially, and appreciate the wide-ranging training options that let me find the best fit for my goals"

    Angel

    Founder,/ IntellChromatics.

    Offensive Penetration Testing Certification Training

    As a pentester, you need to understand the methods of real-life attackers and use the tools, techniques, and resources they exploit. Join ethical hacker Clint Kehr as he guides you from basic hacking concepts to advanced exploitation techniques in this Offensive Penetration Testing Course. Develop the hacker mindset or hone your existing skills.
    21
    49
    M
    Time
    intermediate
    difficulty
    22
    ceu/cpe

    Course Content

    Course Description

    This Offensive Penetration Testing (OSCP) training will primarily be hands-on and build familiarity from basic hacking concepts to more advanced exploitation techniques, while also demonstrating through video lectures to teach learners penetration testing methodologies and tools. The course will cover how to set up Kali Linux and use the tools within it to perform a penetration test by learning how to scan targets, conduct enumeration to find vulnerabilities within networks as well as web applications, modify exploit code to fit the environment to successfully exploit the target, obtain a shell on a target, and then escalate privileges to successfully “own” a target all in a controlled and organized manner in preparation to write a comprehensive penetration test report. Learners will also become familiar with how to write the penetration test report as this is an equally important requirement for their pentesting career. This course will also help learners develop the hacker mindset of how to think laterally and with agility while under stress and a time limit in order to successfully exploit targets. This course is equally beneficial for those with a basic level of knowledge of penetration testing and want more hands-on experience to hone their skills.

    This is a deep course about penetration testing. In this OSCP training course, you’ll learn from basic to the most advanced and modern techniques to find vulnerabilities through information gathering, create and/or use exploits and be able to escalate privileges in order to test your information systems defenses.

    Prerequisites for this OSCP Training Online

  • Solid understanding of TCP/IP networking
  • Reasonable Windows and Linux administration experience
  • Familiarity with the Windows and Linux command line
  • Familiarity of Bash scripting with basic Python
  • Course Goals

    By the end of this course, students should be able to:

  • Set up Kali Linux and understand the tools it has available
  • Conduct a full penetration test
  • Write a comprehensive penetration test report
  • Understand what the hacker mindset is and help develop it
  • What Is Offensive Security (OSCP)?

    Offensive security allows developers to find vulnerabilities within a system or application by gathering information. Then, the developer creates exploits to escalate privileges in order to test the information systems’ defenses.

    Think of offensive security as a proactive approach to protecting websites and applications. Offensive security training provides developers with penetration testing methodologies and provides them with the knowledge to utilize the tools included with the Kali Linux distribution.

    How Do You Prepare For an Offensive Penetration Testing Certification?

    Before pursuing an offensive penetration testing certification, having specific prerequisites will help you successfully complete the course. Students should have a robust IT Background, InfoSec knowledge, ethical Hacking knowledge, and basic programming skills.

    How Do You Pass an Offensive Penetration Testing Certification?

    The best way to earn the offensive penetration testing certification is to take an online course such as Cybrary’s offensive security training course.

    Cybrary’s course allows students to take the course online, which allows for flexibility to start and stop the videos when it’s convenient for students. Cybrary’s offensive security training will enable students to practice pen tests in a lab and erase their tracks in Labs.

    Is an Offensive Penetration Testing Certification Worth It?

    By the end of this offensive security training course, students will understand how to use passive and active reconnaissance techniques, as well as use basic and advanced scanning and information harvesting techniques. The goal is for developers to be able to create code to exploit vulnerabilities and recognize legitimate public exploits from fake exploits.

    Upon obtaining OSCP certification, students will also be able to:

  • Use and modify public exploits
  • Use several techniques to gain access to a system from both remote and local side
  • Use several methods to escalate privileges
  • Clear your tracks
  • Perform lateral and vertical jumps between systems
  • Use tunnels to compromise other computers on the network or hide your traffic.
  • OSCP training online will help developers in their careers by giving them the skills needed to create executive reports with the results of the pen test and present the findings to your managers.

    What Should I Do After The OSCP Training Online?

    Once you’ve finished this OSCP training, it’s time to utilize your knowledge and skills in the professional world. Having offensive penetration skills on your resume can help you advance your career and earn a coveted role.

    This course is part of a Career Path:
    No items found.

    Instructed by

    Provider
    Cybrary Logo
    Certification Body
    Offensive Security
    Certificate of Completion

    Complete this entire course to earn a Offensive Penetration Testing Certification Training Certificate of Completion