PEN:200 PENETRATION TESTING WITH KALI LINUX

Explore the OffSec PEN-200: Penetration Testing with Kali Linux (PWK)

The industry’s leading penetration testing course, preparing you for the world-renowned OSCP certification.

Key Features & Benefits

70+ hands-on labs simulating real-world networks and attack scenarios

Comprehensive coverage of penetration testing tools and techniques

Built on Kali Linux, the industry-standard ethical hacking platform

Prepares you for the OSCP certification, a globally respected credential

Develop practical, job-ready red teaming and offensive security skills

Learn to think and act like an attacker to strengthen defense strategies

Trusted by top companies, governments, and cybersecurity teams worldwide

A career game-changer — OSCP-certified professionals are highly sought after

Course outline

Select a module to explore detailed content:

Master the core concepts, technologies, and best practices that form the bedrock of cybersecurity, providing a solid foundation for your pen testing journey

Craft clear, actionable reports to detail security vulnerabilities, their potential impact, and step-by-step remediation guidance

Use advanced ethical hacking techniques and tools like Nmap and Shodan to map target systems and discover exploitable vulnerabilities

Use tools like Nessus and OpenVAS to identify known vulnerabilities in networks, applications, and systems to streamline your penetration testing process

Learn how web applications function, what their underlying technologies are, and the architectural weaknesses that create common attack vectors

Explore the techniques behind common web attacks, injection flaws, session hijacking, and the essential strategies to stop them

Master the art of manipulating databases through SQL injections to extract sensitive information, compromise backend systems, and escalate your privileges

Exploit vulnerabilities in web browsers, browser extensions, and client-side technologies to compromise user systems and gain access

Find reliable public exploits, assess their significance, and responsibly integrate them into your security testing workflow

Adapt and customize existing exploits, employ obfuscation techniques, and develop creative payloads to bypass defenses and successfully test target systems

Develop strategies and techniques to disguise exploits, obfuscate payloads, and evade detection by antivirus solutions to simulate real-world attacker behavior

Uncover weak authentication practices using password cracking techniques like brute-force, dictionary attacks, and rainbow table methods to improve password security

Identify and exploit misconfigurations and vulnerabilities in Windows systems to gain admin-level access and more control within a network

Escalate your privileges and gain root-level access to fully compromised servers and critical infrastructure on Linux systems

Establish covert channels, pivot through networks, evade detection, and maintain persistence during penetration tests with sophisticated tunneling protocols and techniques

Use Metasploit s broad capabilities for exploit development, payload generations, and post-exploitation activities to streamline your penetration testing tasks

Understand the structure of Active Directory, learn to enumerate users, groups, trusts, and sensitive configurations using tools like BloodHound and PowerView to identify attack paths

Exploit weaknesses in Active Directory authentication mechanisms (Kerberos, NTLM, etc) to compromise credentials and gain unauthorized access

Move laterally in Active Directory environments, expand your control, and achieve your penetration testing objectives with post-exploitation techniques and tools

Our partners & vendors

Ready to grow your cybersecurity team?

Get expert guidance on upskilling your team and building a cybersecurity workforce tailored to your business needs.

Training prerequisites

Core knowledge

Understanding of computer networking concepts, including: IP addressing and subnetting, routing and switching, TCP/IP stack and network protocols (e.g., DNS, HTTP, ARP, ICMP). Familiarity with common network services and how they operate.

Technical skills

Comfortable using Linux systems, including: Command-line navigation and scripting basics, file systems, permissions, and process management, installing and managing software packages

Familiarity with Windows environments and basic administration tasks. Ability to use common network and troubleshooting tools, such as: ping, traceroute, netstat, nmap, curl, nslookup, and telnet.

Recommended experience

1–2 years of experience in IT, networking, or system administration.

Completion of an entry-level security course like SEC-100: Cybersecurity Essentials or equivalent self-study.

Training & register details

TRAINING OVERVIEW

PEN-200: Penetration Testing with Kali Linux

Empower your team with advanced penetration testing expertise through the industry-leading OSCP certification.

Duration: 321h of content

Format: Online

Level: Intermediate

Language: English

Exam: online

HOW TO REGISTER

1. Submit your application

Fill out a quick application to show your interest in the OSCP training program.

2. Intro call

We’ll schedule a brief call to discuss your background, skills, and career goals.

3. Confirm your spot

Once accepted, complete your enrollment and receive all necessary course details and prep materials.

4. Start learning

Get access to the PEN-200 learning platform, explore labs, and start building your penetration testing skills.

5. Join the community

Connect with peers and mentors through exclusive chats, events, and networking opportunities.

Who is OSCP for?

Aspiring penetration testers & professionals

Kickstart your career in offensive security with hands-on, real-world hacking experience. Advance your skills and gain the OSCP certification.

Teams & enterprises

Equip your security teams to think and act like attackers, strengthening organizational defenses.

Government & Defense

Trusted by government agencies and defense sectors to develop experts in advanced cyber warfare tactics.

Educators

Enhance your training programs with practical, lab-driven penetration testing content from OffSec.

FAQ

The OffSec Certified Professional (OSCP) is one of the world’s most respected penetration testing certifications. It demonstrates your ability to identify, exploit, and report vulnerabilities in real-world systems using advanced ethical hacking techniques.

The OSCP exam is a 24-hour hands-on test where you must hack into a series of systems and complete a comprehensive penetration test report. It mirrors real-world attack scenarios and requires strategic planning, persistence, and technical skill.

OSCP certification is renowned because it’s 100% practical — there are no multiple-choice questions. It proves you can perform real-world penetration testing tasks, not just understand theory.

Start your journey with us

Ready to grow your skills or start a new career in cybersecurity?
Leave your contact details, and our experts will get back to you shortly — whether you need help choosing the right course or certification program, or want details about enrollment and schedules.
By clicking "Request a Consultation", you consent to the processing of your personal data in line with our Privacy Policy.
By clicking "Request a Consultation", you consent to the processing of your personal data in line with our Privacy Policy.
Scroll to Top

Let’s Talk About Your Project

Need a consultation or more information? We’re here to help!
Leave your contact details, and our experts will get back to you shortly — whether it’s about choosing the right cybersecurity services, training your team, or getting certified.
By clicking "Request a Consultation", you consent to the processing of your personal data in line with our Privacy Policy.
By clicking "Request a Consultation", you consent to the processing of your personal data in line with our Privacy Policy.