Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

06:50 PM
Dark Reading
Dark Reading
Products and Releases

Offensive Security Continues to Expand Security Training and Certification Offerings with New Advanced Pentest Training Course

Evasion Techniques and Breaching Defenses Represents Unique Opportunity for Security Professionals to Take Careers to New Heights

NEW YORK – October 27, 2020 – Offensive Security, the leading provider of hands-on cybersecurity training and certification, today announced the launch of Evasion Techniques and Breaching Defenses (PEN-300), the company’s newest penetration testing training course. Designed as a successor to the popular Penetration Testing with Kali Linux (PWK) course, PEN-300 teaches students the skills necessary to bypass many different types of defenses during security assessments by performing advanced attacks against hardened networks.

In conjunction with the launch of PEN-300, Offensive Security also introduced a new certification, the Offensive Security Experienced Penetration Tester (OSEP), which demonstrates a security professional’s ability to perform in-depth security assessments against mature organizations.

“Offensive Security is committed to providing those interested in cybersecurity with an expansive set of opportunities to grow their skillsets and advance their careers regardless of where they are in their professional journey,” said Ning Wang, CEO, Offensive Security. “Whether you are just starting out or a seasoned cybersecurity professional, there is an OffSec training opportunity available. PEN-300 provides a valuable next step for our PWK graduates, allowing them to take the ‘Try Harder’ mindset to the next level.”

PEN-300 further expands the spectrum of Offensive Security training and certification offerings. The curriculum is advanced, designed for security professionals that already have significant experience in offensive security techniques and a strong command of penetration testing.

The PEN-300 course material walks students through:

  • Client Side Attacks
  • Process Injection and Migration
  • Antivirus Evasion
  • Application Whitelisting
  • Bypassing Network Filters
  • Windows and Linux Lateral Movement
  • Active Directory Exploitation
  • Microsoft SQL Attacks

With the adversarial, “Try Harder” mindset emphasized in every Offensive Security course, PEN-300 students graduate with a command of new penetration testing techniques, the ability to identify potential avenues of infiltration and execute organized attacks in a controlled and focused manner. Students who complete the course and pass the 48-hour certification exam will earn their OSEP certification, and develop a reinforced and expanded ability to think like an attacker when doing assessment work.

Prior to enrolling in PEN-300, prospective students are encouraged to have either taken PWK and earned the Offensive Security Certified Professional certification or have equivalent experience. For more information on Evasion Techniques and Breaching Defenses, visit www.offensive-security.com, follow Offensive Security on Twitter @offsectraining and LinkedIn, or visit the Offensive Security blog: https://www.offensive-security.com/blog/

About Offensive Security

Offensive Security is the leading provider of online penetration testing training and certifications for information security professionals. Created by the community for the community, Offensive Security’s one-of-a-kind mix of practical, hands-on training and certification programs, virtual labs and open source projects provide practitioners with the highly-desired offensive skills required to advance their careers and better protect their organizations. Offensive Security is committed to funding and growing Kali Linux, the leading operating system for penetration testing, ethical hacking and network security assessments. For more information, visit www.offensive-security.com/ and follow @offsectraining and @kalilinux.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-23
A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph...
PUBLISHED: 2020-11-23
A flaw was found in rhacm versions before 2.0.5 and before 2.1.0. Two internal service APIs were incorrectly provisioned using a test certificate from the source repository. This would result in all installations using the same certificates. If an attacker could observe network traffic internal to a...
PUBLISHED: 2020-11-23
A flaw was found in the psql interactive terminal of PostgreSQL in versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If an interactive psql session uses \gset when querying a compromised server, the attacker can execute arbitrary code as the operating sy...
PUBLISHED: 2020-11-23
TYPO3 is an open source PHP based web content management system. In TYPO3 from version 10.4.0, and before version 10.4.10, RSS widgets are susceptible to XML external entity processing. This vulnerability is reasonable, but is theoretical - it was not possible to actually reproduce the vulnerability...
PUBLISHED: 2020-11-23
prive/formulaires/configurer_preferences.php in SPIP before 3.2.8 does not properly validate the couleur, display, display_navigation, display_outils, imessage, and spip_ecran parameters.