Looking for Live Training in 2025? - View upcoming classes

Find OffSec training for your cybersecurity role or area of responsibility

The OffSec Learning Library has training for critical cybersecurity job roles. No matter your area of expertise, OffSec provides continuous training to keep your organization secure.

Offensive Security

Defensive Security

Secure Development

IT Team cybersecurity

Entry-level

Essentials

Intermediate

Advanced

= Course Certification

= Learning Path Badge

Network Penetration Tester Training

Simulate cyber attacks on computer systems, networks, or applications in a controlled environment. In order to identify vulnerabilities and weaknesses to assess the security posture of a target system. Pen testers help organizations understand and rectify their vulnerabilities before malicious hackers can exploit them.

Web Application Tester Training

Web application testers conduct tests on software applications, network hardware, and cloud-based systems to identify vulnerabilities.

Exploit Developer/Security Researcher/Threat Intelligence Training

An exploit developer (aka: Security researcher, aka: Threat Intelligence) is an individual who identifies and investigates vulnerabilities in software or systems with the intent of enhancing security. Once a vulnerability is discovered, the exploit developer writes code, known as an "exploit," to demonstrate how the vulnerability can be taken advantage of. This code serves as a proof-of-concept to validate the existence and potential impact of the vulnerability.

SOC Analyst Training

As a Security Operations Center (SOC) analyst, you are responsible for monitoring, detecting, and responding to cybersecurity threats and incidents within an organization. SOC analysts are at the front lines of an organization's defense against cyberattacks and play a pivotal role in maintaining its overall security posture.

Digital Forensics & Incident Responder (DFIR) Training

Manage and mitigate security incidents within an organization. Identify, assess, and respond to security breaches, cyberattacks, or other incidents that could potentially compromise the confidentiality, integrity, or availability of an organization's data and systems.

Threat Hunter Training

Proactively and methodically search through computer networks, endpoints, and datasets of organizations to detect and isolate advanced threats that conventional security solutions might miss.

Security Essentials Training

Develop fundamental cybersecurity skills through hands-on exercises, learning to identify vulnerabilities, mitigate risks, and defend against cyber attacks. Gain a comprehensive understanding of core security principles, essential tools, and best practices to protect systems and data.

Cloud Engineer & DevSecOps Training

Secure cloud computing environments against cyber threats and ensure these systems comply with various regulatory standards including integrating security in every phase of software development and operations.

Software Developer Training

Responsible for creating computer software, software developers conceptualize software solutions, write and test code, and ensure that the final product meets the needs of users.

System Administrator Training

A system administrator manages and maintains the daily operations of computer systems and networks, ensuring that hardware and software function smoothly and efficiently. They play a crucial role in implementing and enforcing cybersecurity measures to protect data from unauthorized access and cyber threats. This focus on cybersecurity is vital because it safeguards sensitive information and maintains the integrity and reliability of the technological infrastructure on which organizations depend.

IT Generalist Training

Keep systems updated with the latest software, and offer technical support to both in-house and remote users. IT generalists continually monitor network security, evaluate existing security programs, update antivirus software, and run scans to ensure network integrity.