safenet-logo

Offsec Training Programs

We believe that a well-informed and cyber-aware workforce is a vital component
of a strong cybersecurity defense.Our comprehensive Cybersecurity Training Solutions are
tailored to equip your employees with the
knowledge and skills needed to identify and mitigate potential risks.

Penetration Tester Programs


PEN-200: Penetration Testing with Kali Linux

The Penetration Testing with Kali Linux (PWK/PEN-200) course, which is at the forefront of the industry, teaches penetration testing methods, tools, and techniques through practical, self-paced learning.

✔ Exam
✔ Prerequisites
✔ Benefits

PEN-210: Foundational Wireless Network Attacks

Wireless Attacks (PEN-210) teaches students the necessary skills for auditing and securing wireless devices. It is a fundamental course, similar to PEN-200, that benefits individuals seeking to enhance their network security expertise.

✔ Exam
✔ Prerequisites
✔ Benefits

PEN-300: Advanced Evasion Techniques and Breaching Defenses

PEN-300, known as Evasion Techniques and Breaching Defenses, is an advanced course in penetration testing. Upon successful completion of the course and exam, participants will receive the OffSec Experienced Pentester (OSEP) certification.

✔ Exam
✔ Prerequisites
✔ Benefits



Exploit Development


EXP-301: Windows User Mode Exploit Development

EXP-301, Windows User Mode Exploit Development, is a course designed to introduce learners to the fundamentals of modern exploit development. Despite its foundational nature, it is classified at the 300 level due to its reliance on a strong understanding of assembly and low-level programming.

✔ Exam
✔ Prerequisites
✔ Benefits

EXP-312: Advanced macOS Control Bypasses

EXP-312, Advanced macOS Control Bypasses, is our inaugural macOS security offering. It is an offensive course in logical exploit development tailored for macOS, concentrating on local privilege escalation and circumventing the operating system's security measures.

✔ Exam
✔ Prerequisites
✔ Benefits

EXP-401: Advanced Windows Exploitation

In Advanced Windows Exploitation (EXP-401), OffSec challenges learners to create innovative solutions that are effective in today's complex exploitation landscape. This course emphasizes the need for modern bypass methods to overcome Microsoft's defenses, as contemporary exploits for Windows-based platforms demand them.

✔ Exam
✔ Prerequisites
✔ Benefits



Secure Web Development Programs


WEB-200: Foundational Web Application Assessments with Kali Linux

Foundational Web Application Assessments with Kali Linux (WEB-200) teaches the basics of web application assessments. Upon completing the course and passing the exam, participants will receive the OffSec Web Assessor (OSWA) certification, demonstrating their proficiency in using web exploitation techniques on contemporary applications.

✔ Exam
✔ Prerequisites
✔ Benefits

WEB-300: Advanced Web Attacks and Exploitation

WEB-300, Advanced Web Attacks and Exploitation, is an advanced course in web application security. It provides the skills necessary to perform white box web application penetration tests. Upon successful completion of the course and exam, participants will receive the OffSec Web Expert (OSWE) certification, demonstrating their expertise in exploiting front-facing web applications.

✔ Exam
✔ Prerequisites
✔ Benefits



Security Operations


SOC-200: Foundational Security Operations and Defensive Analysis

Foundational Security Operations and Defensive Analysis (SOC-200) is a course tailored for roles like Security Operations Center (SOC) Analysts and Threat Hunters, offering a solid grounding in cybersecurity defense. Participants get practical exposure to a SIEM, where they learn to detect and evaluate various real-world attacks across different network setups.

✔ Exam
✔ Prerequisites
✔ Benefits



Different Learning paths


Network Penetration Testing Essentials (PEN-100)

Gain essential knowledge and skills across multiple cybersecurity domains with this learning path, which includes

✔ Thorough overview of information security principles.
✔ Practical exposure to tools and methods.
✔ Progression toward advanced cybersecurity courses.

Web Application Assessment Essentials (WEB-100)

Begin an exploration into web application security. This Learning Path serves as an introduction to advanced web application training, combining theoretical concepts with practical, hands-on learning opportunities.

✔ Web technology fundamentals
✔ Basic scripting and tools
✔ Beginner security methodologies

Exploit Development Essentials (EXP-100)

Start an adventure into the realm of exploit development with this Learning Path, which combines theoretical understanding with practical application. Participants will delve into:

✔ Fundamental aspects of different operating systems and their susceptibilities.
✔ Critical scripting abilities using Python, Bash, and additional tools.
✔ Methods for examining and crafting exploits.

Security Operations Essentials (SOC-100)

Provide learners with essential skills for addressing defensive cybersecurity issues. Our Security Operations Essentials Learning Path includes:

✔ Foundational frameworks
✔ Endpoint operations basics
✔ Server-side attack countermeasures

Introduction to Cloud Security (CLD-100)

With the increasing adoption of cloud-based network architecture, it's essential for every member of an enterprise security team to have a strong grasp of cloud security fundamentals. The Introduction to Cloud Security learning path provides learners with:

✔ A fundamental understanding of Cloud Architecture, Container Technology, and Kubernetes.
✔ Understanding of cloud design patterns and key security controls.
✔ Hands-on experience in managing containerized environments.

Introduction to Secure Software Development (SSD-100)

This learning path provides a hands-on method for incorporating security into software design and implementation, essential for safeguarding digital assets. Learn:

✔ Key security approaches and tools.
✔ Blend of theoretical concepts and practical application.
✔ Focus on designing and implementing security measures.



Live Training


Get live training from Certified Offsec Specialists.

PEN-200 Live Training

PEN-200 4 Week Training

PEN-200 8 Week Training

Read More

Explore Further: Dive into the details of our Attack Simulation and SOC Operation Services through our 'Read More' section. Discover how we simulate real-world attacks to uncover vulnerabilities, evaluate your defense strategies, and enhance your cybersecurity posture. Unveil the inner workings of our Security Operations Center (SOC), where our vigilant experts monitor, detect, and respond to cyber threats in real-time.

Learn how our integrated approach combines cutting-edge technology, industry expertise, and proactive strategies to ensure your digital assets remain resilient against evolving threats. If you're ready to take a deeper look into our attack simulation and SOC operations, this section is your gateway to a more comprehensive understanding.

 
phone-hacker

SafeNet Can Help!

We’re happy to answer any questions you may have and help you determine which of our services best fit your needs.
▬ Facebook
▬ LinkedIn
▬ WhatsApp
What Happens next?