The OSCP Certification

Table of contents

What is OSCP Certification?

The OSCP certification course was first offered by Offensive Security in 2006 under the name "Offensive Security 101".

OSCP certification is considered the hardest and most demanding entry-level penetration testing/IT security certificate to earn. This is partly because the OSCP certification award was the first certificate to rely on a practical exam and partly because of the try-harder mentality. This is a great feature that is reflected in all Offensive Security certificates:

Logo of the Offensive Security
Icon Hacker
A hacker must not give up just because he has reached a dead end and is stuck.
Icon Map
It is up to him to find a creative "workaround" himself, and without help.
Icon_4-300x300
Only those who internalize this mentality can pass the OSCP certification.

OSCP Certification - online self-study course

This is an online self-study course that provides insight into penetration testing tools and techniques through hands-on experience. Since there is no official training to become a penetration tester, OSCP certification is not only respected and well-known, but required for many IT security jobs.

The course is not aimed at beginners, but at information security experts who already have experience in the field of penetration testing. At the end of the theoretical part of the training in the course of the OSCP certification, which takes place either via video conference or video on demand and includes many practical exercises in the "practice lab", one can participate in the final test. In this 24-hour exam, which takes place in an unknown VPN environment, participants must earn points, which you earn by compromising hosts.

Submission in the form of a report

Furthermore, a comprehensive, professional report of the penetration test, which includes screenshots and comprehensive notes, must be submitted as part of the final exam. In addition, the OSCP certification exam is fully proctored. No prior knowledge or assistance about the Lab is given.

After successfully passing the final exam, graduates are able to identify existing vulnerabilities and carry out organized attacks in a controlled and targeted manner. In addition, however, OSCP certification also shows that, one not only belongs to the technical elite, but also has stamina and assertiveness and can competently confront new and unknown situations.

Become a junior penetration tester now....
...and take the OSCP certification with you!
To the application

Who is the OSCP certification course made for?

As mentioned in the section above, this course is designed for information security professionals who want to take a serious and meaningful step into the world of professional penetration testing. This course includes:

  • Pentesters seeking industry-leading OSCP certification.
  • Security experts
  • Network Administrators
  • Other technology professionals

Own time management is a prerequisite

Furthermore, it is absolutely necessary to master time management. The 24-hour exam for OSCP certification must be planned neatly in advance. If you don't master the balance of active exploiting, scanning and writing notes, you won't pass the exam either.

OSCP Certification Contents:

Practical tools

Bash scripting

Passive information gathering

Actively gather information

Vulnerability scanning

Attacks on web applications

Introduction to buffer overflows

Windows buffer overflows

Linux buffer overflows

Client-side attacks

Finding public exploits

Fix exploits

File transfers

Antivirus bypass

Privilege Escalation

Password attacks

Port redirection and tunneling

Active Directory Attacks

PowerShell Empire

Are you interested in working as a penetration tester?
Together with the IHK we offer you a corresponding training!
To the penetration tester training

What are the prerequisites for the OSCP certification course?

According to Offensive Security, for successful completion and thus OSCP certification, aspirants need a solid understanding of TCP/IP networks, a reasonable amount of experience administering Windows/Linux systems, and familiarity with Bash scripts. Basic knowledge of the Python or Perl scripting language is also required. In reality, however, it is safe to say that experience has shown that many other things are required. In addition to the time management and personal attitude already mentioned, extensive knowledge and skills in many areas of IT are necessary.
OTHER CONTRIBUTIONS
ProSec Kerberos Attacks
Kerberos Attacks

Kerberos ist das überwiegend genutzte Authentifizierung-Protokoll im Microsoft Active Directory und hat dort in der alltäglichen Verwendung den New Technology

Read more "

Table of contents

Do you want to be part of our team?