portal.offensive-security.com Open in urlscan Pro
2606:4700:10::6816:31dc  Public Scan

URL: https://portal.offensive-security.com/
Submission: On October 06 via api from VN — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

THIS WEBSITE USES COOKIES

We use cookies to personalise content and ads, to provide social media features
and to analyse our traffic. We also share information about your use of our site
with our social media, advertising and analytics partners who may combine it
with other information that you’ve provided to them or that they’ve collected
from your use of their services. You consent to our cookies if you continue to
use our website.
[#OOI_PERSONAL_INFORMATION#]
Use necessary cookies only Allow all cookies Show details
OK
Use necessary cookies only Allow selection Allow all cookies
Necessary
Preferences
Statistics
Marketing
Show details
Cookie declaration [#IABV2SETTINGS#] About
 Necessary (11)  Preferences (0)  Statistics (4)  Marketing (0)  Unclassified
(5)
Necessary cookies help make a website usable by enabling basic functions like
page navigation and access to secure areas of the website. The website cannot
function properly without these cookies.

NameProviderPurposeExpiryTyperc::aGoogleThis cookie is used to distinguish
between humans and bots. This is beneficial for the website, in order to make
valid reports on the use of their website.PersistentHTMLrc::cGoogleThis cookie
is used to distinguish between humans and bots. SessionHTMLmStripeDetermines the
device used to access the website. This allows the website to be formatted
accordingly. 2 yearsHTTPJSESSIONIDNew RelicPreserves users states across page
requests.SessionHTTP__stripe_midStripeThis cookie is necessary for making credit
card transactions on the website. The service is provided by Stripe.com which
allows online transactions without storing any credit card information.1
yearHTTP__stripe_sidStripeThis cookie is necessary for making credit card
transactions on the website. The service is provided by Stripe.com which allows
online transactions without storing any credit card information.1
dayHTTPCookieConsentCookiebotStores the user's cookie consent state for the
current domain1 yearHTTPcsrftokenportal.offensive-security.comHelps prevent
Cross-Site Request Forgery (CSRF) attacks.1
yearHTTPpa_enabledSolarwindsDetermines the device used to access the website.
This allows the website to be formatted accordingly.
PersistentHTMLpersist:rootUserguidingThis cookie stores visitor credentials in
an encrypted cookie in order to allow the visitor to stay logged in on reentry,
if the visitor has accepted the 'stay logged
in'-button.PersistentHTML__cf_bmVimeoThis cookie is used to distinguish between
humans and bots. This is beneficial for the website, in order to make valid
reports on the use of their website.1 dayHTTP

Preference cookies enable a website to remember information that changes the way
the website behaves or looks, like your preferred language or the region that
you are in.

We do not use cookies of this type.

Statistic cookies help website owners to understand how visitors interact with
websites by collecting and reporting information anonymously.

NameProviderPurposeExpiryTypeevents/1/#New RelicUsed to monitor website
performance for statistical purposes.SessionPixeljserrors/1/#New
RelicPendingSessionPixelpaSolarwindsRegisters the website's speed and
performance. This function can be used in context with statistics and
load-balancing.PersistentHTMLvuidVimeoCollects data on the user's visits to the
website, such as which pages have been read.2 yearsHTTP

Marketing cookies are used to track visitors across websites. The intention is
to display ads that are relevant and engaging for the individual user and
thereby more valuable for publishers and third party advertisers.

We do not use cookies of this type.

Unclassified cookies are cookies that we are in the process of classifying,
together with the providers of individual cookies.

NameProviderPurposeExpiryType___ug___UserguidingPendingPersistentHTML__UGS__uidUserguidingPendingPersistentHTMLdarkModeportal.offensive-security.comPendingPersistentHTMLOSFamiliesportal.offensive-security.comPendingPersistentHTMLug-guide-eventsUserguidingPendingPersistentHTML

 [#IABV2_LABEL_PURPOSES#]  [#IABV2_LABEL_FEATURES#]  [#IABV2_LABEL_PARTNERS#]
[#IABV2_BODY_PURPOSES#]
[#IABV2_BODY_FEATURES#]
[#IABV2_BODY_PARTNERS#]
Cookies are small text files that can be used by websites to make a user's
experience more efficient.

The law states that we can store cookies on your device if they are strictly
necessary for the operation of this site. For all other types of cookies we need
your permission.

This site uses different types of cookies. Some cookies are placed by third
party services that appear on our pages.

You can at any time change or withdraw your consent from the Cookie Declaration
on our website.

Learn more about who we are, how you can contact us and how we process personal
data in our Privacy Policy.
Cookie declaration last updated on 20.09.22 by Cookiebot
We're sorry but the Offensive Security Platform doesn't work properly without
JavaScript enabled. Please enable it to continue.
Library
Courses
Sign in Register



OFFENSIVE SECURITY TRAINING LIBRARY

 * All
 * Labs
 * Skills
 * Job Roles
 * Courses
 * 



FILTERS




LEVEL


100
200
300

SKILLS


Cloud Security
Exploit Development
Penetration Testing
Security Operations
Web Application Attacks

JOB ROLES


Back-end Developers
Cloud Architects
Cloud Engineers
Cloud Pentesters
DevSecOps
Show all

COURSES


EXP-100
EXP-301
EXP-312
PEN-100
PEN-103
Show all


NEW RELEASES

View more View all

TOPIC



INTRODUCTION TO CYBERSECURITY

This Topic provides a high level overview of the cybersecurity landscape. It
includes information on...

Level
4h

TOPIC

This Topic provides a high level overview of the cybersecurity landscape. It
includes information on how cybersecurity is practiced, threat actor
classifications, the CIA triad, cybersecurity principles and controls,
cybersecurity laws, regulations and stanadards, as well as various career
opportunities within the cybersecurity industry.

INTRODUCTION TO CYBERSECURITY IS PART OF

Level 100

New Releases New Releases

Job Roles Network Penetration Testers, Exploit Developers, SOC Analysts, Malware
Analysts, System Administrators (System Hardeners), Cloud Architects, Cloud
Pentesters, Site Reliability Engineers, DevSecOps, Cloud Engineers, Front-end
Developers, Back-end Developers, Fullstack Developers, Web Application Testers,
Digital Forensics Analysts, Incident Responders, Threat Hunters, Vulnerability
Researchers

TOPIC



INTRODUCTION TO NETWORK FIREWALLS

Introduction to Network based firewalls including iptables, egress rules,
pfsense rules...

Level
5h

TOPIC

Introduction to Network based firewalls including iptables, egress rules,
pfsense rules

INTRODUCTION TO NETWORK FIREWALLS IS PART OF

Skills Security Operations

Level 100

New Releases New Releases

TOPIC



UNDERSTANDING DIRECTORY TRAVERSAL

Introduction to directory traversal, including relative and absolute pathing,
Apache Web Service, in...

Level
6h

TOPIC

Introduction to directory traversal, including relative and absolute pathing,
Apache Web Service, interesting system files, and directory listing.

UNDERSTANDING DIRECTORY TRAVERSAL IS PART OF

Skills Web Application Attacks

Level 100

Operating Systems Linux/Windows

New Releases New Releases

Job Roles Site Reliability Engineers, Front-end Developers, Back-end Developers,
Fullstack Developers, Web Application Testers, Threat Hunters


LABS

PLAY 50 MACHINES



PROVING GROUNDS PLAY

Dedicated access to the VulnHub community generated Linux machines....

Level


PROVING GROUNDS PLAY

Dedicated access to the VulnHub community generated Linux machines.

PRACTICE 111 MACHINES



PROVING GROUNDS PRACTICE

Includes all the features of PG Play plus additional Windows and Linux machines
developed by OffSec ...

Level


PROVING GROUNDS PRACTICE

Includes all the features of PG Play plus additional Windows and Linux machines
developed by OffSec experts with unlimited time on any targets.


SKILLS

View more View all

CLOUD SECURITY

Defending cloud data, connectivity, infrastructure, and functionality against
threats....

Level
1d 21h

CLOUD SECURITY

Defending cloud data, connectivity, infrastructure, and functionality against
threats.

EXPLOIT DEVELOPMENT

Research into how programs work and how they might be manipulated to perform
unintended and dangerou...

Levels
26d 6h

EXPLOIT DEVELOPMENT

Research into how programs work and how they might be manipulated to perform
unintended and dangerous functions.

PENETRATION TESTING

The act of performing ongoing cycles of research and attack against a target or
boundary....

Levels
1mo 14d 11h

PENETRATION TESTING

The act of performing ongoing cycles of research and attack against a target or
boundary.


JOB ROLES

View more View all

BACK-END DEVELOPERS

Software engineers who code solutions for the server-side of a web
application....

Levels
11d 15h

BACK-END DEVELOPERS

Software engineers who code solutions for the server-side of a web application.

CLOUD ARCHITECTS

IT professionals who design and manage cloud-based architecture to address
business, security, and e...

Levels
4d 1h

CLOUD ARCHITECTS

IT professionals who design and manage cloud-based architecture to address
business, security, and efficiency objectives.

CLOUD ENGINEERS

IT professionals who design, manage, maintain, and support cloud-based
solutions....

Levels
1d 22h

CLOUD ENGINEERS

IT professionals who design, manage, maintain, and support cloud-based
solutions.


COURSES

View more View all

EXP-100

An introductory survey of tools and technologies required for learning exploit
development. Includes...



EXP-100

An introductory survey of tools and technologies required for learning exploit
development. Includes reading and writing assembly for Intel and ARM processors,
the usage of various debuggers and disassemblers, and other Topics.

EXP-301 | OSED CERTIFICATION



EXP-301

An intermediate-level course which teaches students the fundamentals of modern
exploit development. ...

Level
12d 6h

EXP-301

An intermediate-level course which teaches students the fundamentals of modern
exploit development. It starts with basic buffer overflow attacks and builds
into learning the skills needed to crack the critical security mitigations
protecting enterprises.

EXP-312 | OSMR CERTIFICATION



EXP-312

An advanced course that teaches the skills necessary to bypass security controls
implemented by macO...

Level
8d 18h

EXP-312

An advanced course that teaches the skills necessary to bypass security controls
implemented by macOS, and exploit logic vulnerabilities to perform privilege
escalation on macOS systems.


OFFSEC LIVE

OSA - PEN - 200



OFFSEC ACADEMY - PEN-200

OffSec Live: PEN-200 is a scheduled and open streaming offering that includes a
learning journey des...



OFFSEC ACADEMY - PEN-200

OffSec Live: PEN-200 is a scheduled and open streaming offering that includes a
learning journey designed for OffSec students currently enrolled in PEN-200.



 * © 2022  Offensive Security
   |
 * Privacy
   |
 * Terms of service