PEN-300: Evasion Techniques and Breaching Defenses

Explore the OffSec PEN-300: Advanced Evasion Techniques and Exploits (OSEP)

Take your penetration testing skills to the next level with advanced techniques, preparing you for the prestigious OSEP certification.

Key features & benefits

60+ hands-on labs simulating advanced attack and evasion scenarios

Master stealth techniques to bypass modern security controls and defenses

Gain expertise in advanced exploitation, privilege escalation, and persistence

Built on real-world red teaming and offensive security methodologies

Prepares you for the OSEP certification, a globally respected credential for elite penetration testers

Develop job-ready skills to execute complex, targeted attacks in enterprise environments

Learn to think like advanced threat actors to strengthen organizational defenses

Trusted by top enterprises, governments, and defense sectors worldwide

A career-boosting step for senior penetration testers and red team professionals

Course outline

Select a module to explore detailed content:

Study memory management, process scheduling, file systems, and other essential OS components, gaining a solid foundation for understanding and exploiting vulnerabilities

Focus on leveraging known vulnerabilities in Microsoft Office applications to craft malicious documents that trigger code execution on a victim’s machine, gaining unauthorized access and control

Exploit Jscript for code execution attacks, gaining unauthorized access and control of machines in Windows environments

Master the art of stealth and persistence by injecting malicious code into legitimate running processes, migrating between processes to evade detection and maintain control when processes are terminated.

Create malware that goes undetected with basic techniques like obfuscation and packing to bypass and evade antivirus software/

Use advanced methods like signature based and heuristic based evasion to create malware that goes undetected by complex antivirus solutions.

Bypass security measures intended to restrict the execution of unauthorized software

Gain access to restricted resources and networks with different techniques for bypassing network filters and firewalls.

Navigate file systems, manipulate user accounts, extract sensitive information, and establish persistent backdoors on compromised Linux systems.

Navigate file systems, manipulate user accounts, extract sensitive information, and establish persistent backdoors on compromised Windows system.

Break out of restricted kiosk environments like ATMs or point-of-sale terminals to gain control of their operating systems.

Use different methods and techniques to extract valuable credentials like passwords and hashes from Windows systems.

Exploit trust relationships, leverage vulnerabilities in services and protocols to gain access to systems throughout a compromised Linux network.

Attack vulnerabilities in Microsoft SQL Server databases to extract sensitive data, escalate privileges, and gain control over entire systems.

Exploit vulnerabilities in Active Directory to compromise domains in Windows networks.

Combine multiple exploits, techniques, and tools to create complex, multi-stage attacks to bypass multiple layers of security.

Apply your knowledge and skills in challenging, real-world scenarios with complex network environments, hardened security measures, and realistic attack scenarios.

Our partners & vendors

Ready to grow your cybersecurity team?

Get expert guidance on upskilling your team and building a cybersecurity workforce tailored to your business needs.

Training prerequisites

Core Knowledge

Strong understanding of computer networking concepts, including: IP addressing and subnetting, Routing and switching, TCP/IP stack and key protocols (DNS, HTTP, ICMP, ARP).

Familiarity with common network services and how they function in enterprise environments.

Technical Skills

Proficiency with Linux systems, including: Command-line navigation and scripting basics. Managing file systems, permissions, and processes. Installing and configuring software packages

Solid understanding of Windows environments and administrative tasks.

Experience using common network and troubleshooting tools, such as: nmap, netstat, curl, ping, traceroute, nslookup, telnet, and PowerShell.

Recommended experience

2–3 years of professional experience in IT, networking, penetration testing, or system administration.

Completion of PEN-200: Penetration Testing with Kali Linux (PWK) or equivalent experience.

Prior hands-on experience with penetration testing tools, scripting, and exploit development.

Training & register details

TRAINING OVERVIEW

PEN-300: Evasion Techniques and Breaching Defenses

Equip your team with advanced evasion and exploitation skills through PEN-300, preparing for the prestigious OSEP certification.

Training Duration: 710h of content

Format: Online

Level: Expert

Language: English

Exam: online

HOW TO REGISTER

1. Submit your application

Fill out a quick application to show your interest in the PEN-300: Advanced Evasion Techniques and Exploits course.

2. Intro Call

We’ll schedule a brief call to discuss your background, advanced skills, and career goals.

3. Confirm Your Spot

Once accepted, complete your enrolment and receive the license code.

4. Start Learning

Access the PEN-300 learning platform, dive into advanced labs, and master evasion and exploitation techniques.

5. Join the Community

Connect with elite professionals and mentors through exclusive chats, events, and networking opportunities.

Who is OSEP for?

Penetration testers & professionals

Take your skills to the next level with advanced evasion and exploitation techniques. Earn the OSEP certification and stand out as an elite security professional.

Teams & Businesses

Train your teams to bypass modern defenses and execute advanced attack simulations, strengthening your organization’s resilience.

Government & Defense

Trusted by agencies worldwide to develop experts capable of tackling the most sophisticated cyber threats.

Educators

Enhance your curriculum with advanced, lab-driven training content to prepare students for real-world offensive security challenges.

FAQ

The OffSec Experienced Penetration Tester (OSEP) certification is an advanced credential that validates your ability to evade modern security defenses, exploit complex environments, and perform advanced red team operations in real-world scenarios.

The OSEP is designed for:

You will learn to:

Before attempting OSEP, you should have:

The OSEP exam is a 48-hour practical assessment simulating a complex corporate environment. Candidates must evade security defenses, gain control of systems, and submit a detailed penetration test report documenting their methodology and findings.

Start your journey with us

Ready to grow your skills or start a new career in cybersecurity?
Leave your contact details, and our experts will get back to you shortly — whether you need help choosing the right course or certification program, or want details about enrollment and schedules.
By clicking "Request a Consultation", you consent to the processing of your personal data in line with our Privacy Policy.
By clicking "Request a Consultation", you consent to the processing of your personal data in line with our Privacy Policy.
Scroll to Top

Let’s Talk About Your Project

Need a consultation or more information? We’re here to help!
Leave your contact details, and our experts will get back to you shortly — whether it’s about choosing the right cybersecurity services, training your team, or getting certified.
By clicking "Request a Consultation", you consent to the processing of your personal data in line with our Privacy Policy.
By clicking "Request a Consultation", you consent to the processing of your personal data in line with our Privacy Policy.

Thank you!

Your message has been successfully sent.
Our team will get back to you shortly.