Description
PEN-200: PenetrationTesting with Kali Linux
OSCP Certification
The industry-leading Penetration Testing with Kali Linux (PWK/PEN-200) course introduces penetration testing methodologies, tools, and techniques in a hands-on, self-paced environment. Access PEN-200’s first Learning Module for an overview of course structure, learning approach, and what the course covers.
Learners who complete the course and pass the exam will earn the OffSec Certified Professional (OSCP) certification which requires holders to successfully attack and penetrate various live machines in a safe lab environment. The OSCP is considered to be more technical than other ethical hacking certifications and is one of the few that requires evidence of practical penetration testing skills.
Course Info
Benefits
- Access to OffSec KAI (Knowledge AI)
- Increase OSCP preparedness with OffSec Academy, expert instructor-led streaming sessions
- Access to recently retired OSCP exam machines
- Introduction to the latest hacking tools and techniques
- Training from the experts behind Kali Linux
- Develop an adversarial mindset
About the exam
- The PEN-200 course and online lab prepares you for the OSCP penetration testing certification
- 24-hour exam
- Proctored
- Learn more about the exam
Who is this course for?
- Infosec professionals transitioning into penetration testing
- Pentesters seeking one of the best pentesting certifications
- Those interested in pursuing a penetration tester career path
- Security professionals
- Network administrators
- Other technology professionals
Prerequisites
All learners are required to have:
- Solid understanding of TCP/IP networking
- Reasonable Windows and Linux administration experience
- Familiarity with basic Bash and/or Python scripting
More details
Syllabus
PEN-200 is a unique course that combines traditional course materials with hands-on simulations, using a virtual lab environment. The course covers the following topics.
- Penetration Testing with Kali Linux: General Course Introduction
- Introduction to Cybersecurity
- Effective Learning Strategies
- Report Writing for Penetration Testers
- Information Gathering
- Vulnerability Scanning
- Introduction to Web Applications
- Common Web Application Attacks
- SQL Injection Attacks
- Client-Side Attacks
- Locating Public Exploits
- Fixing Exploits
- Antivirus Evasion
- Password Attacks
- Windows Privilege Escalation
- Linux Privilege Escalation
- Advanced Tunneling
- The Metasploit Framework
- Active Directory Introduction and Enumeration
- Attacking Active Directory Authentication
- Lateral Movement in Active Directory
- Assembling the Pieces
- Trying Harder: The Labs
Discover more from Easy Learning (Since 2013)
Subscribe to get the latest posts sent to your email.