Become a Partner
Add OffSec to your list of training providers
Partner with usNo results found.
Modern development demands security integrated into DevOps processes. Automate infrastructure with security in mind, optimize workflows, and accelerate software delivery.
Use Git effectively, build security perspectives on Git, and practice Git hands-on. Whether you're a developer, DevOps engineer, security engineer, or in another technical role, you'll benefit from a solid understanding of Git.
Integrate security into every phase of the software development lifecycle from coding to deployment.
Tackle sophisticated attacks and elevate secure coding skills. Dive into configuration hardening, and vulnerability analysis to protect web applications with greater depth.
Embark on a journey into the world of embedded systems and gain a holistic understanding of their design, components, and inner workings.
Aligned with the MITRE ATT&CK framework, This learning path covers nearly 70% of the skills required to match the entire attack framework including tactics like, Reconnaissance, Resource Development, Initial Access and eight more!
3 learning paths that Build your team's defensive skill sets and address cybersecurity countermeasure components and capabilities for these three techniques.
Fortify web applications and explore proven techniques to safeguard software and systems.
Learn advanced techniques to emulate real-world adversaries. Master event tracing, obscure Windows event logs, and execute stealthy process injection to refine your Red Team arsenal.
Learn to identify and investigate threats, uncover potential attack techniques, and proactively improve your security posture by addressing vulnerabilities.
Develop UNIX system administration skills and harden infrastructure against attacks. Learn to configure Debian and macOS, harden the nginx web server, and utilize advanced security controls like SELinux and AppArmor.
Strengthen your organization's security posture with OffSec's hands-on vulnerability management training. Learn to proactively identify and mitigate risks.
Build secure web infrastructure. Master web server hardening, secure coding techniques, database protection, and TLS/PKI. Take our OffSec Web System Administration Learning Path
Develop Windows system administration skills and harden infrastructure against attacks. Learn secure configuration, Active Directory, IIS, MSSQL, and more.
Get a comprehensive introduction to information security concepts and hands-on experience with tools and techniques. Understanding the basics of Linux and Windows systems and dive into scripting, networking, and cryptography.
Build strong fundamentals for security operations. Equip learners with fundamental skills for defensive cybersecurity challenges.
A primer for advanced web application training, blending theory with practical, hands-on experiences. Dive into core web attacker methodologies, secure coding, and critical aspects like cryptography and version control with Git.
Practical approach to integrating security into software design and implementation, vital for protecting digital assets.
Explore OWASP’s critical risks, from Injection flaws to Broken Authentication. Gain insight into defending against Cross-Site Scripting and Insecure Deserialization.
Understand and apply the fundamentals of cloud security, from Cloud Architecture and Container Technology to mastering essential security controls.
Understand the essentials of incident response, from preparation and detection to recovery and post-mortem analysis. OffSec's modules are meticulously designed to provide a solid foundation for handling cyber incidents.
Teaches the basics of various operating systems and their vulnerabilities. Including, essential scripting skills with Python, Bash, and other tools. In addition, students learn techniques for analyzing and writing exploits.
Strengthen your cloud security proficiency with an emphasis on secure cloud practices. Develop a security-centric understanding of essential cloud technologies to confidently tackle real-world cloud challenges.
Learn to outsmart attackers and proactively defend your cloud assets in this learning path. Delve into sophisticated cloud penetration testing, CI/CD pipeline exploitation, and container escape techniques.