OffSec PEN-200 Live Training
This course introduces penetration testing methodologies, tools, and techniques in a hands-on, self-paced environment.
More Information:https://www.offsec.com/wp-content/uploads/2023/03/PEN-200-Module-General-Course-Info.pdf
Learners who complete the course and pass the exam will earn the OffSec Certified Professional (OSCP) certification.
The OSCP is considered to be more technical than other ethical hacking certifications and is one of the few that requires evidence of practical penetration testing skills.
Training Outline
-
Title
OffSec PEN-200 Live Training
-
Trainer
Ruslan Sayfiev
-
Date
November 9th (SAT) - 13th (WED), 2024 , 9:00 - 18:30 , 5 days
-
Venue
-
Capacity
40 students (*Minimum students count is 20)
-
Remarks
- Include 2day Conference ticket(November 14th to 15th, 2024) for training attendee
- This course is provided in Japanese.
Training Application
Training Detail
- Infosec professionals transitioning into penetration testing
- Pentesters seeking one of the best pentesting certifications
- Those interested in pursuing a penetration tester career path
- Security professionals
- Network administrators
- Other technology professionals
- Basic knowledge of application security concepts and web application testing techniques preferred but not required.
What students should bring
A strong laptop capable of running 2 VMs at a time
- A minimum of 8 GB RAM is required
- At least 80 GB of free usable hard disk space
- The latest version of VMWare Workstation or Fusion. Please do not bring VMware Player or Server due to feature limitations
- Admin rights to your computer, or enough rights to install the VM and make changes to your machine as needed
- Ability to run x86/x64 Vmware VMs (No ARM/Apple Silicon/M1 based systems)
What students will be provided with
You will be granted access to the online course for 90 days, as well as the right to take the exam.
Trainer:Ruslan Sayfiev
After gaining experience as a system administrator and security engineer in Russia, I have been involved in vulnerability assessments for web applications, networks, APIs, and automobiles in Japan.
I joined Ierae Security in February 2018, where I have been responsible for penetration testing, red team exercises, and the development and validation of vulnerability assessment tools.
I have been credited in Common Vulnerabilities and Exposures (CVEs) for identifying vulnerabilities in major products such as Microsoft and Cisco.
Additionally, through participation in security competitions like Capture The Flag (CTF) and platforms such as Hack The Box, I continuously hone my skills and demonstrate unwavering commitment to the ever-evolving field of cybersecurity.