Table of Contents

Join Our Membership To Start Your Cybersecurity Journey Today!

Why Offensive Security Certifications Are The Best

offensive security

Offensive Security is an online provider of information security training and certifications. The founders of Offensive Security are also the creators of Kali Linux. The certifications offered by Offensive Security team are highly regarded in the field of Information Security. Following is a brief overview of the premium cyber-security certifications offered by Offensive Security team.

Offensive Security Certified Professional (OSCP)

OSCP is a trusted Information security certification offered by Offensive Security. The certification validates the core penetration testing (ethical hacking) knowledge and skills of Information security professionals. The OSCP holders are considered capable of performing the following tasks.

  • Identifying and exploiting network vulnerabilities
  • Identifying and exploiting web vulnerabilities, such as XSS, SQL injection, and file inclusion (LFI/RFI) vulnerabilities
  • Simulating cyber-attacks to point out the weaknesses in cyber-defense systems
  • Writing new scripts/codes for penetration testing
  • Modifying/editing the existing penetration testing codes/scripts

OSCP Exam

Those who are interested in taking OSCP exam must complete the prerequisite Penetration Testing with Kali Linux (PWK) course. It is an online, self-paced course offered by Offensive Security team. Latest hacking tools and techniques are taught to the registered students with access to the virtual labs for practicing the tutorials. The PWK course covers the following topics.

Information Gathering Techniques Vulnerabilities Scanning
Win32 Buffer Overflow Exploitation How to Use Exploits
Linux Buffer Overflow Exploitation Privilege Escalation
Transferring Files Web Attacks
Remote and Client Side Attacks Port Redirecting and Tunneling
Password Attacks How to Bypass Antivirus and Firewalls
How to Use Metasploit Framework Penetration Testing Breakdown

Source: https://www.offensive-security.com/documentation/penetration-testing-with-kali.pdf

The skills of examinees are tested using virtual networks, containing various targets with different configurations. The candidates are given 24 hours to perform different penetration testing tasks, such as scanning targets, finding vulnerabilities, gaining access, escalating accounts’ privileges, and maintaining access. A penetration testing report containing detailed notes and screenshots of the findings is submitted by each candidate at the end of exam period. The candidates are assessed and awarded on the basis of submitted penetration testing report. Those who pass the OSCP exam are informed through email with the credential proof. Offensive Security does not issue the digital version of the OSCP to the successful candidates.

Offensive Security Certified Expert (OSCE)

OSCE is one of the most challenging certification offered by Offensive Security.  The individuals who possess OSCE certification are considered capable of performing the following tasks.

  • Identifying hard-to-find vulnerabilities, such as Address space layout randomization (ASLR) issues
  • Finding coding errors and security flaws through fuzzing
  • Doing analysis, correction, and modification of exploitation codes
  • Writing powerful scripts that can bypass antivirus software

OSCE Exam

Cracking the Perimeter (CTP) is the prerequisite course before going for OSCE exam. CTP is an online, self-paced advanced level penetration testing course designed for penetration testing experts and security professionals. Since it is an advanced level course, the interested students (certification candidates) must have prior understanding of Windows exploitation techniques, OllyDbg, shellcode encoding, Metasploit framework, and Linux OS. Registration for CTP online course is not a straightforward process. Candidates are required to complete an online challenge of bypassing the registration formalities.

CTP challenge screenshot

Those who fail in solving the online challenge are considered ineligible for course registration and OSCE certification. The CTP course covers the following topics in detail.

Introduction The Web Application Angle
Cross Site Scripting Attacks Directory Traversal
The Backdoor Angle Backdooring PE files under Windows Vista
Advanced Exploitation Techniques Dealing With Vista
Cracking the Egghunter The 0Day Angle
Windows TFTP Server HP Openview NNM
The Networking Angle Bypassing Cisco Access Lists
GRE Route-Map Kung Fu Sniffing Remote Traffic

Source: https://www.offensive-security.com/documentation/cracking-the-perimeter-syllabus.pdf

Those who successfully complete CTP course can take OSCE examination. OSCE is a 48 hours online exam that tests the advanced level penetration testing skills of the candidates in a virtual environment. The examinees are required to submit a report of their findings and accomplished tasks. The candidates are informed through an email about the results and issuance of OSCE certification.

Offensive Security Web Expert (OSWE)

OSWE certification is designed to validate web applications penetration testing skills of the individuals. The OSWE holders are considered expert in performing the following penetration testing tasks.

  • Auditing web applications codes
  • Finding web application vulnerabilities
  • Launching pre-written web exploits
  • Writing new exploits for web applications
  • Compromising sanitization filters
  • Performing chain attacks through multiple vulnerabilities

OSWE Exam

Advanced Web Attacks and Exploitation (AWAE) is the prerequisite course before applying for OSWE exam. AWAE is an online course that covers web application security and penetrating testing techniques. Since AWAE is an advanced level course, the interested individuals should have prior understanding of web attack vectors, knowledge of file permissions, clear concepts of writing and editing codes, expertise in programming languages (such as Python, Perl, and PHP), and knowledge of web proxies like Burp suite. AWAE course covers the following topics in detail.

Cross Site Scripting Cross Site Request Forgery
Session Hijacking Data Exfiltration
SQL Injection .NET Deserialization
Evading File Extension Filters Evading File Upload Permissions
Bypassing REGEX Bypassing Character Constraints
Postgre SQL Hashes
Comparisons .Net Assemblies Debugging

Source: https://www.offensive-security.com/documentation/awae-syllabus.pdf

OSWE exam consists of virtual network containing web applications and operating systems. The candidates are given 48 hours for fingerprinting web applications, finding web vulnerabilities, and exploiting them. The report submitted by each candidate at the end of exam evaluates the successful exploitation of hosts by the examinees. The OSWE results are announced and dispatched through emails.

Offensive Security Exploitation Expert (OSEE)

OSEE is an advanced level exploits development certification that validates users’ knowledge and skills to develop effective exploits through research, reverse engineering, and code assembly/disassembly. OSEE holders are acknowledged for performing the following tasks.

  • Creating custom shell codes
  • Developing sophisticated exploits
  • Performing precision heap sprays
  • Exploiting Windows Kernel drivers
  • Evading Data Execution Prevention (DEP) and Address space layout randomization (ASLR) securities

OSEE Exam

Offensive Security offers Advanced Windows Exploitation (AWE) course to all the candidates interested in OSEE certification. AWE is a pre-requisite course for OSEE that is taught live at Black Hat USA in Las Vegas. Those who cannot make it to the Black Hat USA can opt for In-House training sessions offered by Offensive Security.  It is highly recommended to have windows exploits, debuggers, and Python scripting knowledge before taking the AWE classes.  Topics covered in AWE course are listed below.

NX/ASLR Bypass Techniques Function Pointer Overwrites
Precision Heap Spray EMET Mitigations Techniques
Windows Kernel Exploitation Techniques Kernel Pool Exploitation Techniques

Source: https://www.offensive-security.com/information-security-training/advanced-windows-exploitation/

OSEE exam consists of virtual labs having systems with specific vulnerabilities. The candidates are given 72 hours to find the vulnerabilities and develop the exploits. A documentation report is required at the end of exam to evaluate the performance of each candidate.

Scroll to Top