Explore the enhancements we're made to PEN-200 (PWK) 2023, including restructured course content, expanded Learning Modules, & Challenge Labs.
Offensive Security related news articles. The official Offsec blog.
Build the path to a secure future with the refreshed OffSec! Dive into the details behind our ever-evolving learning library, new logo, and modernized name.
A comprehensive OffSec yearly recap: revisit some of the highlights, wins and important cybersecurity training themes that guided us through 2022.
Accelerate your learning and earn an OffSec cybersecurity certification in just 90 days. Learn about the benefits of our 90-day course and cert bundles.
Wrapping up 2022 with OffSec's Q4 community update! Find details about our latest community efforts, payment plans, live training, and much more.
We’re sharing some significant updates to Exploit Database, one of OffSec’s community projects.
Tristram shows you how to host a PHP web page on Kali Linux and how you can use it to stage payloads that are hidden behind a wall of conditional access requirements.
Learn how Nettitude, a global provider of cybersecurity services leveraged OffSec courses to support their cybersecurity training program, support new talent, and upskill and reskill their team of professionals.
As part of Cybersecurity Awareness Month 2022, we share out insights on starting a career in cloud security, together with key skills, prerequisites, career outlook, and much more.
As part of Cybersecurity Awareness Month 2022, we share a complete guide to starting a career in web application security with insight into career outlook, essential skills, and much more.
Welcome to OffSec's Q3 community update! This post discusses the launch of our Giving Program, new content, OffSec Academy, and much more.
As part of Cybersecurity Awareness Month 2022, we share a complete guide to starting a career in security operations and defense.
OffSec's Csaba Fitzl shares how he reverse-engineered the macOS auto-login process, including the walls he hit, and the times he resorted to trial-and-error approaches.
In part one of this post, Tristram teaches you how to use TXT records to stage payloads that can be retrieved through DNS lookups.
Read about how the skillfulness of your security practitioners can impact your overall cybersecurity program and posture.
In this blog, we’ll briefly cover how CFI mitigations works, including CET, and how we can leverage COOP to effectively bypass Intel CET on the latest Windows releases.