Find OffSec training for your cybersecurity role or area of responsibility
The OffSec Learning Library has training for critical cybersecurity job roles. No matter your area of expertise, OffSec provides continuous training to keep your organization secure.
Network Penetration Tester Training
Simulate cyber attacks on computer systems, networks, or applications in a controlled environment. In order to identify vulnerabilities and weaknesses to assess the security posture of a target system. Pen testers help organizations understand and rectify their vulnerabilities before malicious hackers can exploit them.
PEN-200: Penetration Testing with Kali Linux
The renowned pentesting course, learn pentesting foundations and practice the latest techniques on Kali Linux.
PEN-210: Wireless Network Attacks
Build wireless attack expertise to test and secure networks.
PEN-300: Evasion Techniques and Breaching Defenses
Perform advanced penetration tests against mature organizations and focus on bypassing advanced security mechanisms.
MITRE ATT&CK Training
Assess your cybersecurity attack team skills using the MITRE ATT&CK framework. Understand skill gaps and develop OffSec training plans for your team.
Network Penetration Testing Essentials
Learn the fundamentals of pentesting from Linux basics to secure coding
Offensive Cloud Foundations
Find cloud vulnerabilities, exploit CI/CD weaknesses, and escape containers
Red Teaming
Explore advanced evasion techniques and exploit development strategies
Web Application Tester Training
Web application testers conduct tests on software applications, network hardware, and cloud-based systems to identify vulnerabilities.
Exploit Developer/Security Researcher/Threat Intelligence Training
An exploit developer (aka: Security researcher, aka: Threat Intelligence) is an individual who identifies and investigates vulnerabilities in software or systems with the intent of enhancing security. Once a vulnerability is discovered, the exploit developer writes code, known as an "exploit," to demonstrate how the vulnerability can be taken advantage of. This code serves as a proof-of-concept to validate the existence and potential impact of the vulnerability.
EXP-301: Windows User Mode Exploit Development
Create exploits from scratch to bypass Windows defenses.
EXP-312: macOS Control Bypasses
Specialize in MacOS exploit development by mastering privilege escalation and advanced bypass techniques.
EXP-401: Advanced Windows Exploitation
Tackle advanced topics like DEP and ASLR evasion, heap spraying, function pointer overwrites, and more.
SOC Analyst Training
As a Security Operations Center (SOC) analyst, you are responsible for monitoring, detecting, and responding to cybersecurity threats and incidents within an organization. SOC analysts are at the front lines of an organization's defense against cyberattacks and play a pivotal role in maintaining its overall security posture.
Security Operations Essentials
Build a solid foundation for advanced skills to protect digital assets
UNIX System Administration Foundations
Learn to configure Debian and macOS, harden nginx web servers, and more
Vulnerability Management Foundations
Learn to proactively identify and mitigate risks
Web System Administration Foundations
Configure secure web servers and harden web applications
Windows System Administration
Learn secure configuration, Active Directory, IIS, MSSQL, and more
Digital Forensics & Incident Responder (DFIR) Training
Manage and mitigate security incidents within an organization. Identify, assess, and respond to security breaches, cyberattacks, or other incidents that could potentially compromise the confidentiality, integrity, or availability of an organization's data and systems.
Threat Hunter Training
Proactively and methodically search through computer networks, endpoints, and datasets of organizations to detect and isolate advanced threats that conventional security solutions might miss.
Security Essentials Training
Develop fundamental cybersecurity skills through hands-on exercises, learning to identify vulnerabilities, mitigate risks, and defend against cyber attacks. Gain a comprehensive understanding of core security principles, essential tools, and best practices to protect systems and data.
Cloud Engineer & DevSecOps Training
Secure cloud computing environments against cyber threats and ensure these systems comply with various regulatory standards including integrating security in every phase of software development and operations.
Cloud Essentials Security Training
Learn to identify cloud vulnerabilities and master proactive defense
DevSecOps Essentials
Securely automate infrastructure, optimize workflows, and accelerate software delivery
GitOps Essentials
Practice common Git commands inside multiple labs with Git-related challenges
Introduction to Cloud Security
Understand and apply the fundamentals of cloud security
Offensive Cloud Foundations
Find cloud vulnerabilities, exploit CI/CD weaknesses, and escape containers
Software Developer Training
Responsible for creating computer software, software developers conceptualize software solutions, write and test code, and ensure that the final product meets the needs of users.
Introduction to Secure Software Development
Develop the skills you need to create secure software systems
Secure Software Development Essentials
Integrate security into every phase of the software development lifecycle
Intermediate Secure Software Development I
Practice integrating security throughout the software development cycle
Intermediate Secure Software Development II
Develop the ability to assess, identify, and fix deep-rooted vulnerabilities
OWASP Top 10 - 2021 Essentials
Gain hands-on experience in application security
System Administrator Training
A system administrator manages and maintains the daily operations of computer systems and networks, ensuring that hardware and software function smoothly and efficiently. They play a crucial role in implementing and enforcing cybersecurity measures to protect data from unauthorized access and cyber threats. This focus on cybersecurity is vital because it safeguards sensitive information and maintains the integrity and reliability of the technological infrastructure on which organizations depend.
Introduction to Cloud Security
Understand and apply the fundamentals of cloud security
MITRE D3FEND Training
Assess your cybersecurity defend team skills using the MITRE D3FEND framework. Understand skill gaps and develop OffSec training plans for your team.
Network Penetration Testing Essentials
Learn the fundamentals of pentesting from Linux basics to secure coding
UNIX System Administration Foundations
Learn to configure Debian and macOS, harden nginx web servers, and more
Web System Administration Foundations
Configure secure web servers and harden web applications
Windows System Administration
Learn secure configuration, Active Directory, IIS, MSSQL, and more
IT Generalist Training
Keep systems updated with the latest software, and offer technical support to both in-house and remote users. IT generalists continually monitor network security, evaluate existing security programs, update antivirus software, and run scans to ensure network integrity.
Introduction to Secure Software Development
Develop the skills you need to create secure software systems
Introduction to Cloud Security
Understand and apply the fundamentals of cloud security
MITRE D3FEND Training
Assess your cybersecurity defend team skills using the MITRE D3FEND framework. Understand skill gaps and develop OffSec training plans for your team.
Network Penetration Testing Essentials
Learn the fundamentals of pentesting from Linux basics to secure coding
Security Operations Essentials
Build a solid foundation for advanced skills to protect digital assets
Web Application Assessment Essentials
Learn core web attack concepts, cryptography, and version control