Blog
Dec 19, 2013
Penetration Testing with Kali Linux – Online Course Update
Over a year ago, when we first sat down and began on what would become Kali Linux, we realized that with all the major changes, we would also need to update our flagship course, Penetration Testing with BackTrack (PWB), to be inline with Kali Linux. With the release of Kali, we ensured that we mentioned the impact this would have on PWB and that an update to the course was in the works.
3 min read

We at Offensive Security are proud today to announce the online version of our newest class “Penetration Testing with Kali Linux” (PWK). Penetration Testing with Kali Linux will be available for purchase starting on 05 January, 2014. Offensive Security students and alumni will be receiving an email from us within the next week with information regarding discounted upgrades.
About Penetration Testing with Kali Linux
Over a year ago, when we first sat down and began on what would become Kali Linux, we realized that with all the major changes, we would also need to update our flagship course, Penetration Testing with BackTrack (PWB), to be inline with Kali Linux. With the release of Kali, we ensured that we mentioned the impact this would have on PWB and that an update to the course was in the works.
Our initial intent for the PWB course update was that it would be a relatively simple affair. We would simply update the materials to correspond to Kali Linux and keep pretty much everything else the same. A quick, simple process. After all, why fix what is not broken?
The Only Official Kali Linux Penetration Testing Training
However, we quickly realized that we wanted to do far more. In fact, you could say we wanted to “Try Harder”. This process led to a complete re-write of the course. We took everything we learned from 8 years of being the leader of performance-based information security training and combined it with everything we have seen work, and not work, in penetration tests that we have conducted ourselves. This has created the most up-to-date and comprehensive penetration testing course ever, covering cutting-edge techniques that are effective in real world networks today, brought to you by the developers and creators of the Kali Linux security distribution.
Battle Tested in BlackHat
Students of our recent live courses at Black Hat Las Vegas and Black Hat Seattle have already had a glimpse of the newly designed course. The feedback we have received so far has been stellar – so we knew that we were on the right track.
Over this past year, we have been hard at work re-writing, editing, re-recording, and doing even more editing to make sure that we have everything done to the high standards that we set for ourselves and that our students expect of us. Now, at long last, we are nearing the completion of our journey and the release of Penetration Testing with Kali Linux (PWK) is almost upon us.
We know that you are excited as we are. Watch this space for more information as it becomes available.
Ready to Try Harder?
Hands-on InfoSec training designed for Information Security professionals! If you found us, then you’re here for a reason. Do you have what it takes to become a certified professional penetration tester? If so, register YOUR class today!
Cybersecurity leader resources
Sign up for the Secure Leader and get the latest info on industry trends, resources and best practices for security leaders every other week
Latest from OffSec

Insights
Empowering Women in Cybersecurity: How Education and Training Are Key
While women represent only 24% of the cybersecurity workforce, hands-on training is changing the game.
Feb 28, 2025
5 min read

Insights
Women in Cybersecurity Leadership: Inspiring Role Models at the Top
Celebrate Women’s History Month by recognizing the women shaping cybersecurity and driving innovation in the industry.
Feb 24, 2025
11 min read

Federal
Addressing the Unique Cybersecurity Challenges Faced by Government Agencies
Explore the unique cybersecurity challenges government agencies face and how tailored strategies can protect national security and public trust.
Feb 12, 2025
8 min read