Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

10/27/2020
06:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Offensive Security Continues to Expand Security Training and Certification Offerings with New Advanced Pentest Training Course

Evasion Techniques and Breaching Defenses Represents Unique Opportunity for Security Professionals to Take Careers to New Heights

NEW YORK – October 27, 2020 – Offensive Security, the leading provider of hands-on cybersecurity training and certification, today announced the launch of Evasion Techniques and Breaching Defenses (PEN-300), the company’s newest penetration testing training course. Designed as a successor to the popular Penetration Testing with Kali Linux (PWK) course, PEN-300 teaches students the skills necessary to bypass many different types of defenses during security assessments by performing advanced attacks against hardened networks.

In conjunction with the launch of PEN-300, Offensive Security also introduced a new certification, the Offensive Security Experienced Penetration Tester (OSEP), which demonstrates a security professional’s ability to perform in-depth security assessments against mature organizations.

“Offensive Security is committed to providing those interested in cybersecurity with an expansive set of opportunities to grow their skillsets and advance their careers regardless of where they are in their professional journey,” said Ning Wang, CEO, Offensive Security. “Whether you are just starting out or a seasoned cybersecurity professional, there is an OffSec training opportunity available. PEN-300 provides a valuable next step for our PWK graduates, allowing them to take the ‘Try Harder’ mindset to the next level.”

PEN-300 further expands the spectrum of Offensive Security training and certification offerings. The curriculum is advanced, designed for security professionals that already have significant experience in offensive security techniques and a strong command of penetration testing.

The PEN-300 course material walks students through:

  • Client Side Attacks
  • Process Injection and Migration
  • Antivirus Evasion
  • Application Whitelisting
  • Bypassing Network Filters
  • Windows and Linux Lateral Movement
  • Active Directory Exploitation
  • Microsoft SQL Attacks

With the adversarial, “Try Harder” mindset emphasized in every Offensive Security course, PEN-300 students graduate with a command of new penetration testing techniques, the ability to identify potential avenues of infiltration and execute organized attacks in a controlled and focused manner. Students who complete the course and pass the 48-hour certification exam will earn their OSEP certification, and develop a reinforced and expanded ability to think like an attacker when doing assessment work.

Prior to enrolling in PEN-300, prospective students are encouraged to have either taken PWK and earned the Offensive Security Certified Professional certification or have equivalent experience. For more information on Evasion Techniques and Breaching Defenses, visit www.offensive-security.com, follow Offensive Security on Twitter @offsectraining and LinkedIn, or visit the Offensive Security blog: https://www.offensive-security.com/blog/

About Offensive Security

Offensive Security is the leading provider of online penetration testing training and certifications for information security professionals. Created by the community for the community, Offensive Security’s one-of-a-kind mix of practical, hands-on training and certification programs, virtual labs and open source projects provide practitioners with the highly-desired offensive skills required to advance their careers and better protect their organizations. Offensive Security is committed to funding and growing Kali Linux, the leading operating system for penetration testing, ethical hacking and network security assessments. For more information, visit www.offensive-security.com/ and follow @offsectraining and @kalilinux.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-26077
PUBLISHED: 2021-05-10
Broken Authentication in Atlassian Connect Spring Boot (ACSB) in version 1.1.0 before 2.1.3 and from version 2.1.4 before 2.1.5: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring...
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.