Got a question? Call 1800 853 276   |   
Cyber Security Category

PEN-200 - Penetration Testing with Kali Linux (OSCP) - Self-paced

  • Length self-paced / 90 days access
  • Price $2420 inc GST
  • Inclusions PEN-200 course + 90-days lab access + OSCP exam
Course overview
Book now

Why study this course

Penetration Testing with Kali Linux (PWK) is an online pentesting course designed for security professionals and network administrators who want to take a serious and meaningful step into the world of professional penetration testing. This best-in-class training course introduces students to the latest ethical hacking tools and techniques, including remote, virtual penetration testing labs for practicing the course materials.  

PWK simulates a full penetration test from start to finish by immersing the student into a target-rich and vulnerable network environment. Students who pass the exam earn the industry-leading OSCP certification. 

PEN-200 (PWK) is Offensive Security’s foundational penetration testing course. Students learn the latest tools and techniques, and practice them in a virtual lab that includes recently retired OSCP exam machines. Earn your Offensive Security Certified Professional (OSCP) certification.

This online ethical hacking course is self-paced. It introduces penetration testing tools and techniques via hands-on experience. PEN-200 trains not only the skills, but also the mindset required to be a successful penetration tester. 

This self-paced course includes: 

  • 17+ hours of video 

  • 850-page PDF course guide 

  • Over 70 machines, including recently retired OSCP exam machines 

  • Active student forums 

  • Access to virtual lab environment 

  • Closed Captioning is available for this course 

About the exam: 

  • The PEN-200 course and online lab prepares you for the OSCP certification 

  • 24-hour exam 

  • Proctored

Learn more about the exam 

Request Course Information

By submitting an enquiry, you agree to our privacy policy and receiving email and other forms of communication from us. You can opt-out at any time.


What you’ll learn

  • Using information gathering techniques to identify and enumerate targets running various operating systems and services 

  • Writing basic scripts and tools to aid in the penetration testing process 

  • Analysing, correcting, modifying, cross-compiling, and porting public exploit code 

  • Conducting remote, local privilege escalation, and client-side attacks 

  • Identifying and exploiting XSS, SQL injection, and file inclusion vulnerabilities in web applications 

  • Leveraging tunneling techniques to pivot between networks 

  • Creative problem solving and lateral thinking skills 


Offensive Security at DDLS

Security professionals from top organisations rely on Offensive Security to train and certify their personnel. DDLS is an Official Training Partner for Offensive Security.


Stay ahead of the technology curve

Don’t let your tech outpace the skills of your people

Quality instructors and content

Expert instructors with real world experience and the latest vendor- approved in-depth course content.

Partner-Preferred Supplier

Chosen and awarded by the world’s leading vendors as preferred training partner.

Ahead of the technology curve

No matter your chosen technologies or platforms, we can help you stay one step ahead.

Who is the course for?

  • Infosec professionals transitioning into penetration testing 

  • Pentesters seeking an industry-leading certification 

  • Security professionals 

  • Network administrators 

  • Other technology professionals 


Course subjects

PEN-200 is a unique course that combines traditional course materials with hands-on simulations, using a virtual lab environment. View the full syllabus here

The course covers the following topics. 

  • Penetration Testing: What You Should Know 

  • Getting Comfortable with Kali Linux 

  • Command Line Fun 

  • Practical Tools 

  • Bash Scripting 

  • Passive Information Gathering 

  • Active Information Gathering 

  • Vulnerability Scanning 

  • Web Application Attacks 

  • Introduction to Buffer Overflows 

  • Windows Buffer Overflows 

  • Linux Buffer Overflows 

  • Client-Side Attacks 

  • Locating Public Exploits 

  • Fixing Exploits 

  • File Transfers 

  • Antivirus Evasion 

  • Privilege Escalation 

  • Password Attacks 

  • Port Redirection and Tunneling 

  • Active Directory Attacks 

  • The Metasploit Framework 

  • PowerShell Empire 

  • Assembling the Pieces: Penetration Test Breakdown 

  • Trying Harder: The Labs 


Prerequisites

All students are required to have: 

  • Solid understanding of TCP/IP networking 

  • Reasonable Windows and Linux administration experience 

  • Familiarity with basic Bash and/or Python scripting 


THIRD PARTY REGISTRATION

DDLS offers training in cybersecurity through our partnership with Offensive Security. This arrangement requires DDLS to provide your details to Offensive Security for registration purposes.


Terms & Conditions

The supply of this course by DDLS is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.


Request Course Information

By submitting an enquiry, you agree to our privacy policy and receiving email and other forms of communication from us. You can opt-out at any time.