OSCP Training

(4.8)
3672 learners

Get started with the OSCP Certification training to master the skills and knowledge you need to become OSCP certified.

enroll now
OSCP Training
CurriculumProjectsTraining OptionsFor CorporatesJob SupportFAQsReviews

Course Features

100% Money back guarantee
Two Real-time Use cases

Real-time Use cases

24/7 Lifetime Support

24/7 Lifetime Support

Certification Assistance

Certification Based Curriculum

Flexible Schedule

Flexible Schedules

One-on-onedoubtclearing

One-on-one doubt clearing

Careerpathguidance

Career path guidance

About OSCP Course

MindMajix offers comprehensive 30-hour OSCP (Offensive Security Certified Professional) training in various learning modes - Instructor-led Classroom, Live Online, and Self-paced with real-time use-cases and practical Labs, which equip the learners with all the essential skills to pass the OSCP Certification Exam. After completing the OSCP Certification training, learners can apply for various Penetration Testing jobs through the included job-search assistance and Mock Interviews.

Prerequisites :

All learners better have:

  • Basic understanding of any scripting languages - Bash or Python scripting
  • TCP/IP networking concepts
  •  Windows and Linux administration concepts

Note: Covered as part of the course

Learning Outcomes:

  • Become an expert at performing penetration testing Tasks
  • Skills needed to pass OSCP Certification
  • Develop job-ready skills with hands-on Labs
  • Earn a shareable career certificate

Difficulty Level & Target Audience: 

Our OSCP Course is for Beginner and advanced security professionals as it covers basic and advanced penetration testing with Kali (PWK)concepts.

OSCP Training
demo play

Course Coverage

Prepare for a career in OSCP

Learn & practice OSCP Concepts

Demonstrate your proficiency in use cases & Lab Assignments
Learn & practice OSCP Concepts

Course Completion Certificate

Earn an employer-recognized Course Completion certificate by Mindmajix.

Resume & LinkedIn Profile

Build your portfolio with personalized suggestions.

Mock Interview

Experience real-time interviews with Mindmajix SMEs

Qualify for in-demand job titles

Senior Penetration Test Engineer, Penetration Tester - OSCP, Senior Security Engineer

Career support

Plan your career move with Mindmajix's job search.

Work Support

Get assistance in completing project tasks once you are employed.
Learn & practice OSCP Concepts

OSCP Course Content

Experts in penetration testing and cybersecurity designed this OSCP course curriclum based on the latest Job Requirements, including the OSCP Certification topics. Please find the topics below.
Topic-wise Content Distribution

Module1: Penetration Testing with Kali Linux

  • Accessing the internal VPN Lab Network
  • Offensive Security Student Form
  • Introduction to Penetration Testing
  • MegaCorpone.com and Sandbox.local Domains
  • PWK VPN Labs
  • Reverts
  • Control Panel
  • Client Machines
  • Kali Virtual Machine
  • Reporting
  • PWK Report

Module2: Kali Linux

  • Botting Up Kali Linux
  • Kali Menu
  • Kali Linux Support Forum
  • Kali Linux Bug Tracker
  • Linux Filesystem
  • Linux Commands
  • Finding Files in Kali Linux
  • Handling the Kali Linux Services
  • HTTP Service
  • SSH Service
  • Installing, Searching, and Removing the Tools
  • Apt update and upgrade
  • Apt - cache search and apt show
  • apt remove - purge
  • dpkg

Module3: Command Line

Section 3.1: Bash Environment

  • Environment Variables
  • Bash History Tricks
  • Tab Completion

Section 3.2: Piping and Redirection

  • Redirecting to the new file
  • Redirecting to the Existing File
  • Redirecting from the File
  • Redirecting STDERR
  • Piping

Section 3.3: Text Searching and Manipulation

  • sed
  • grep
  • awk
  • cut

Section 3.4: Editing Files from a command file

  • Vi
  • nano

Section 3.5: Comparing Files

  • diff
  • comm
  • vimdiff

Section 3.6: Handling Processes

  • Background Process
  • Process Control: kill and ps
  • Jobs Control: jobs and fg

Section 3.7: File Monitoring and Command Monitoring

  • Watch
  • Tail

Section 3.8: Downloading the files

  • curl
  • axel
  • wget

Section 3.9: Customizing Bash Environment

  • Customizing Bash History
  • Persistent  Bash Customization
  • Alias

Module4: Practical Tools

Section 4.1: Netcat

  • Connecting to the TCP/UDP Port
  • Listening on the TCP/UDP Port
  • Transferring the Files with Netcat
  • Remote Administration with Netcat

Section 4.2: Socat

  • Differentiate Netcat and Socat
  • Socat Reverse Shells
  • Socat File Transfers
  • Socat Encrypted Bind Shells

Section 4.3: Powercat and PowerShell

  • PowerShell Reverse Shells
  • PowerShell File Transfers
  • PowerShell Bind Shells
  • Introduction to Powercat
  • Powercat Reverse Shells
  • Powercat File Transfers
  • Powercat Bind Shells
  • Powercat Stand-Alone Payloads

Section 4.4: Wireshark

  • Wireshark Fundamentals
  • Starting Wireshark
  • Display Filters
  • Capture Filters
  • Following TCP Streams

Section 4.5: TCPdump

  • Filtering the Traffic
  • Advanced Header Filtering

Module5: Bash Scripting

  • Variables
  • Arguments
  • If, If-Else, Else Statements
  • Reading User Input
  • Boolean Logical Operations
  • For Loops
  • While Loops
  • Functions

Module6: Passive Information Gathering

  • Website Recon
  • Google Hacking
  • Whois Enumeration
  • Recon-ng
  • Netcraft
  • Open-Source Code
  • Security Headers Scanner
  • Shodan
  • SSL Server Test
  • Pastebin
  • Email Harvesting
  • User Information Gathering
  • Password Dumps
  • Email Harvesting
  • Site-Specific Tools
  • Social Media Tools
  • Stack Overflow
  • OSINT Framework
  • Maltego

Module7: Active Information Gathering

Section 7.1: DNS Enumeration

  • Interaction with the DNS Server
  • Forward Lookup Brute Force
  • Automating Lookups
  • Reverse Lookup Brute Force
  • Relevant Tools in Kali Linux
  • DNS Zone Transfers

Section 7.2: Port Scanning

  • UDP/TCP Scanning
  • Port Scanning with the Nmap
  • Masscan

Section 7.3: SMB Enumeration

  • Scanning for NetBIOS Service
  • Nmap SMB NSE Scripts

Section 7.4: NFS Enumeration

  • Scanning for the NFS Shares
  • Nmap NFS NSE Scripts

Section 7.5: SMTP Enumeration

Section 7.6: SNMP Enumeration

  • SNMP MIB Tree
  • Scanning for the SNMP
  • Windows SNMP Enumeration

Module8: Vulnerability Scanning

Section 8.1: Introduction to Vulnerability Scanning 

  • How Vulnerability Scanners Work
  •  Manual vs. Automated Scanning
  • Internal Scanning vs. Internet Scanning
  • Unauthenticated vs. Authenticated Scanning

Section 8.2: Vulnerability Scanning with Nessus

  • Nessus Installation
  • Specifying Targets
  • Configuring Scan Definitions
  • Unauthenticated and Authenticated Scanning with Nessus
  • Scanning with Individual Nessus Plugins

Section 8.3: Vulnerability Scanning with Nmap

Module9: Web Application Attacks

Section 9.1: Web Application Enumeration

  • Inspection URLs
  • Inspecting Page Content
  • Inspecting the SiteMaps
  • Locating the Administration Consoles

section 9.2: Web Application Assessment Tools

  • Burp Suite
  • Nikto
  • DIRB

Section 9.3: Web-Based Vulnerabilities

  • Exploiting the Admin Consoles
  • File Inclusion Vulnerabilities
  • Cross-Site Scripting
  • Directory Traversal Vulnerabilities
  • SQL Injection

Module10: Buffer Overflows

Section 10.1: x Architecture

  • Program Memory
  • CPU Registers

Section 10.2: Buffer Overflows

  • Sample Vulnerable Code
  • Immunity Debugger
  • Navigating Code
  • Overflowing the Buffer

Module11: Windows Bufferflows

Section 11.1: Discovering the Vulnerability

  • Fuzzing HTTP Protocol
  • Win Buffer Overflow Exploitation

Section 112: DEP, ASLR, and CFG

  • Replicating the Crash
  • Controlling EIP
  • Discovering Space for Our Shellcode
  • Checking for the Bad Characters
  • Redirecting the Execution Flow
  • Finding the Return Address
  • Generating Shellcode with Metasploit
  • Getting the Shell
  • Enhancing the Exploit

Module12: Linux Buffer Overflows

  • DEP, ASLR, and Canaries
  • Controlling EIP
  • Replicating the Crash
  • Checking for the Bad Characters
  • Discovering Space for the Shellcode
  • Finding the Return Address
  • Getting the Shell

Module13: Client-Side Attacks

Section 13.1: Client Information Gathering

  • Passive Client Information Gathering
  • Active Client Information Gathering

Section 13.2: Leveraging the HTML Applications

  • HTA Attack in Action
  • Exploring the HTML Application

Section 13.3: Exploring Microsoft Office

  • Microsoft Office Installation
  • Object Embedding and Linking
  • Microsoft Word Macro
  • Evading the Protected View

Module14: Locating Public Exploits

  • Searching Online Exploit Resources
  • Searching Offline Exploit Resources

Module15: Fixing the Exploits

Section 15.1: Fixing the Memory Corruption Exploits

  • Introduction and Considerations
  • Importing and Reviewing the Exploits
  • Cross-Compiling the Exploit Code
  • Modifying the Socket Information
  • Modifying the Return Address and Payload
  • Modifying the Overflow Buffer

Section 15.2: Fixing the Web Exploits

  • Introduction and Considerations
  • Choosing the Vulnerability
  • Modifying the Connectivity Information
  • Troubleshooting “index out of range” error

Module16: File Transfers

Section 16.1: Preparations and Considerations

  • Dangers of Transmitting the Attack Tools
  • Installing the Pure - FTPd
  • Non-Interactive Shell

Section 16.2: Transferring the Files the Windows Hosts

  • Non-Interactive FTP Download
  • Windows Downloads using the Scripting Language
  • Windows Downloads with exe2hex and PowerShell
  • Windows Uploads using the Windows Scripting Languages
  • Uploading Files with TFTP

Module17: Antivirus Evasion

Section 17.1: Define Antivirus Software

Section 17.2: Methods of Identifying the Malicious Code

  • Signature-Based Detection
  • Behavioral and Heuristic-Based Detection

Section 17.3: Eluding the Antivirus Detection

  • On-Disk Evasion
  • In-Memory Evasion
  • AV Evasion

Module18: Privilege Escalation

Section 18.1: Information Gathering

  • Manual Enumeration
  • Automated Enumeration

Section 18.2: Examples for Windows Privilege Escalation

  • Windows Privileges and Integrity Levels
  • User Account Control
  • User Account Control Bypass
  • Insecure File Permissions
  • Leveraging the Unquoted Service Paths

Section 18.3: Linux Privilege Escalation Examples

  • Linux Privileges
  • Insecure File Permissions: /etc/passwd case study
  • Insecure File Permissions: Cron Case Study
  • Kernel Vulnerabilities: CVE-7-2 Case Study

Module19: Password Attacks

Section 19.1: Wordlists

  • Standard Wordlists

Section 19.2: Brute Force Wordlists

Section 19.3: Common Network Service Attack Methods

  • HTTP htaccess Attack with Medusa
  • Remote Desktop Protocol Attack with the Crowbar
  • HTTP POST Attack with THC-Hydra
  • SSH Attack with THC - Hydra

Section 19.4: Leveraging the Password Hashes

  • Retrieving the Password Hashes
  • Password Cracking
  • Passing the Hash in Windows

Module20: Port Redirecting and Tunneling

Section 20.1: Port Forwarding

  • RINETO

Section 20.2: SSH Tunneling

  • SSH Local Port Forwarding
  • SSH Remote Port Forwarding
  • SSH Dynamic Port Forwarding

Section 20.3: PLINK.exe

Section 20.4: NETSH

Section 20.5: HTTPTunnel-ing Through the Deep Packet Inspection

Module21: Active Directory Attacks

Section 21.1: Active Directory Theory

Section 21.2: Active Directory Enumeration

  • Conventional Approach
  • A Modern Approach
  • Resolving Nested Groups
  • Currently Logged on the users
  • Enumeration using the Service Principal Names

Section 21.3: Active Directory Authentication

  • Kerberos Authentication
  • NTLM Authentication
  • Service Account Attacks
  • Cached Credential Storage and Retrieval
  • Slow and Low Password Guessing

Section 21.4: Active Directory Lateral Movement

  • Pass the Hash
  • Overpass the Hash
  • Distributed Component Object Model
  • Pass the Ticket

Section 21.5: Active Directory Persistence

  • Domain Control Synchronization
  • Golden tickets

Module22: Metasploit Framework

Section 22.1: Metasploit Setup and User Interface

  • Getting Familiarised with MSF Syntax
  • Metasploit Database Access
  • Auxiliary Modules

Section 22.2: Exploit Modules

  • SyncBreeze Enterprise

Section 22.3: Metasploit Payloads

  • Non-Staged vs Staged Payloads
  • Experimenting the Meterpreter
  • Meterpreter Payloads
  • Executable Payloads
  • Client-Side Attacks
  •  Metasploit Exploit Multi Handler
  • Advanced Features and Transports

Section 22.4: Building Own MSF Module

Section 22.5: Post-Exploitation with Metasploit

  • Core Post-Exploitation Features
  • Post-Exploitation Modules
  • Migrating Processes
  • Pivoting with the Metasploit Framework

Section 22.6: Metasploit Automation

Module23: Powershell Empire

Section 23.1: Installation, Usage, and Setup

  • PowerShell Empire Syntax
  • Stagers and Listeners
  • Empire Agent

Section 23.2: PowerShell Modules

  • Situational Awareness
  • Credential and Privilege Escalation
  • Lateral Movement

Section 23.3: Switching Between Empire and Metasploit

Module24: Penetration Test Breakdown

Section 24.1: Public Network Enumeration

Section 24.2: Targeting the Web Application

  • SQL Injection Exploitation
  • Web Application Enumeration
  • Cracking the Password
  • Enumerating Admin Interface
  • Obtaining the Shell
  • Post-Exploitation Enumeration
  • Creating the Stable Pivot Point

Section 24.3: Targeting Database

  • Enumeration
  • Trying to Exploit the Database

Section 24.4: Depper Enumeration of Application Server

  • More Deeper Post Exploitation
  • Searching for the DB Credentials
  • Privilege Escalation

Section 24.5: Targeting Database Again

  • Exploitation
  • Post-Exploitation Enumeration
  • Creating the Stable Reverse Tunnel

Section 24.6: Targeting the Poultry

  • Exploitation (or just logging in)
  • Enumeration
  • Post-Exploitation Enumeration
  • Unquoted Search Path Exploitation

Section 24.7: Internal Network Enumeration

  • Reviewing the Results

Section 24.8: Targeting Jenkins Server

  • Exploiting Jenkins
  • Application Enumeration
  • Privilege Escalation
  • Post Exploitation Enumeration

Section 24.9: Targeting Domain Controller

  • Exploiting Domain Controller
free

Add-ons

Most of the OSCP Jobs in the industry expect the following add-on skills. Hence, we offer these skills-set as FREE Courses (Basics) to ease your learning process and help you stay ahead of the competition.

Agile & Scrum

Hands-on OSCP Projects & Assignments

Our OSCP Training course aims to deliver quality training that covers solid fundamental knowledge on core concepts with a practical approach. Such exposure to the current industry use-cases and scenarios will help learners scale up their skills and perform real-time projects with the best practices.

    Key Skills & Tools Covered

    • Kali Linux
    • Bash Environment
    • Metasploit
    • NetCat
    • Socat
    • PowerCat
    • PowerShell
    • WireShark
    • TCPDump
    • Burp Suite
    • Nikto
    • DIRB
    • Pure - FTPd
    • THC-Hydra

    logoTraining Options

    Choose your own comfortable learning experience.

    Best Value

    On-Demand Training

    30 hrs of Self-Paced Videos

    • 30 hours of OSCP Training videos
    • Curated and delivered by industry experts
    • 100% practical-oriented classes
    • Includes resources/materials
    • Latest version curriculum with covered
    • Get lifetime access to the LMS
    • Learn technology at your own pace
    • 24x7 learner assistance
    • Certification guidance provided
    • Post sales support by our community
    (self-paced)

    Get Pricing

    Preferred

    Live Online (Instructor-Led)

    30 hrs of Remote Classes in Zoom/Google meet

    2025 Batches

    Start - End

    Time

    Weekend

    Mar 29 - Apr 13

    07:00 PM

    Weekdays

    Apr 01 - Apr 16

    07:00 PM

    Weekend

    Apr 05 - Apr 20

    09:00 AM

    Weekdays

    Apr 08 - Apr 23

    09:00 AM

    Customize your schedule here

    + Includes Self-Paced
    • Live demonstration of the industry-ready skills.
    • Virtual instructor-led training (VILT) classes.
    • Real-time projects and certification guidance.

    $ 440

    $ 550

    For Corporates

    Empower your team with new skills to Enhance their performance and productivity.

    Corporate Training

    • Customized course curriculum as per your team's specific needs
    • Training delivery through self-Paced videos, live Instructor-led training through online, on-premise at Mindmajix or your office facility
    • Resources such as slides, demos, exercises, and answer keys included
    • Complete guidance on obtaining certification
    • Complete practical demonstration and discussions on industry use cases
    Learn MoreContact us

    Served 130+ Corporates

    Corporate Clients

    OSCP Certification

    What is the cost of the OSCP certification exam?

    The OSCP Certification exam contains two modules :

    • PEN-103 & 1 KLCP Exam
    • PEN-210 & 1 OSWP Exam

    You should pass the above two exams to become OSCP Certified.

    Cost :

    The cost of OSCP certification in India is 1 Lakh INR, and in the USA - $1599.

    MindMajix certificate
    Zoom

    logoOn-Job Support Service

    Online Work Support for your on-job roles.

    jobservice
    @Learner@SME

    Our work-support plans provide precise options as per your project tasks. Whether you are a newbie or an experienced professional seeking assistance in completing project tasks, we are here with the following plans to meet your custom needs:

    • Pay Per Hour
    • Pay Per Week
    • Monthly
    Learn MoreContact us

    One Access for Multiple Courses

    Choose from our Self-Paced learning library based on trending job Roles or Career Paths at a Discounted price.

    Learn more

    OSCP Training FAQs

    What are the main objectives of this OSCP training?

    The main objective of this OSCP training is to impart the skills required to find vulnerabilities and build comprehensive penetration testing reports. It covers the concepts like testing the information system’s defenses and building proactive approaches to protect the applications and websites. With our extensive course curriculum, instructor-led training sessions, LMS, and certified instructors, you can become a successful penetration tester.

     

    What are the prerequisites to take this Offensive Security Certified Professional course?

    Individuals who want to take this OSCP course should have a fundamental knowledge of Cybersecurity, Network Security, Python, Bash Scripting, Linux, and TCP/IP Networking.

    Who Should take this OSCP training?

    This OSCP training is suitable for windows administrators, cybersecurity professionals, system administrators, and network engineers.

    What are the OSCP Training locations of Mindmajix?

    Besides providing OSCP Online training, Mindmajix offers OSCP courses at physical locations across the globe.
     
     
     
    OSCP Training in Hyderabad :
     
     
    OSCP Training USA Locations :
     
     
    OSCP Training Canada Locations:
     
     
    OSCP Training UK Locations:

    What skills will you learn in this OSCP training?

    In this OSCP training, you will master the following skills: 

    • Finding Files in Kali Linux
    • Redirecting to the existing file
    • Connecting to the TCP/UDP Port
    • Nessus Installation
    • Scanning the Vulnerabilities
    • Retrieving the Password Hashes
    • Exploiting SQL Injection
    • Passing the Hash in Windows
    • Choosing the Vulnerability
    • Targeting the Database

    Which Jobs will you get with this OSCP training?

    With this OSCP training, you can achieve the job roles like Penetration Tester, Security Analyst, Security Engineer, Cybersecurity Researcher, Information Security Specialist, Information Security Engineer, and Cyber Security Engineer.

    Why Should You Learn OSCP?

    The OSCP(Offensive Security Certified Professional) is one of the primary certifications in Cybersecurity and Ethical Hacking released by Offensive Security. It validates your ability to perform advanced penetration testing on corporate networks. Penetration testing is one of the most in-demand job roles in the speedily growing information security market. More and more enterprises are seeking professionals who can demonstrate the expertise required to intentionally hack into their systems to detect vulnerabilities before malicious attackers do. As per Mindmajix Market Analysts, a penetration tester can earn more than $113K per annum.

    I want to complete the training in a few days or a week? Is it possible?

    Yes, we got custom training programs to complete the course as you need.

    What are the system requirements I need to attend online training?

    You need good internet connectivity with a mobile/tab/laptop/system installed with Zoom/Meet.

    How can I access recorded videos of my training sessions?

    You can access the recorded videos through our LMS after every session.

    Do I get any discount on the course?

    Yes, you get two kinds of discounts. They are group discounts and referral discounts.

    • A group discount is offered when you join as a group of three or more.
    • When you are referred by someone already enrolled for training, you receive a referral discount.

    How do I get a course completion certificate?

    You will get a verifiable course completion certificate once you attend all the sessions and successfully submit the assessments.

    How do you help me with certification?

    We provide you with all the necessary resources and guidance to get certified with the relevant software/technology vendor on your own.

    Can you help me with resume preparation?

    Yes, our experts help you draft the perfect resume that matches your desired job roles.

    Do you offer placements after the training program?

    Yes, we help you with placement assistance through mock interviews, resume building, and by forwarding your profile to our corporate clients seeking trained resources.

    How does your mock interviews process work?

    A mock interview is a unique program we offer to help you experience real-time interviews.
    Our expert connects with you, conducts an interview, and provides you feedback and quick tips to improve your skills as needed.

    Can I avail EMI option to pay the fee?

    Yes, we have associated partners who allow payments through three/six easy installments.

    Can I customize the course curriculum?

    Yes, you can customize the course curriculum as per your requirements.

    Can I rejoin the subsequent batch if I cannot continue in the current schedule?

    Yes, we provide feasibility to attend the next batch for the missing sessions; however, we cannot guarantee that the same trainer and the same kind of schedule would be available.

    Will you continuously update your course content as per the latest software version/release available?

    We keep our course curriculum aligned with the current stable Technology / Software version releases.

    We want to hire resources you have trained. Is it possible?

    Yes, we can offer resources depending upon the availability.

    Why is there a difference between live online and self-paced videos duration?

    In the case of live online training, we consider additional interaction time between the trainer and the learners.

    Can we extend the access for the pre-recorded sessions?

    Yes, you can renew the access after one year with a minimal fee.

    Is it possible to customize the live training (scheduling and curriculum)?

    Yes, we can customize the course curriculum and schedule the sessions as per your project requirements.

    Do you conduct assessments at the end of the program?

    Yes, we do conduct assessments.

    Can we extend the lab access beyond training completion?

    Yes. On special request, we can extend lab practice sessions for the learners at an extra cost.

    We need a few consulting sessions with the training after completion. Is it possible?

    Yes, we can arrange consulting sessions with the trainer at an extra cost.

    User Testimonials
    Everyone from start-ups to large enterprises prefer Mindmajix
    Swetha

    The OSCP course curriculum is well-suited and well-designed for the market requirements. The LMS is intelligently designed with relevant examples and great explanations. It provided me the opportunity to work with proper scenarios that enhanced my expertise. It is worth it.

    Swetha

    Rating: 5

    • Swetha
    • Raj
    • Mayurika
    • Abhiudaya
    • Vishwas
    • Baswaraj
    • AJ
    • Jenn
    • GopalRathinam

    OSCP Training Resources

    Teams across the globe run on MindMajix
    +
    Learners, Careers Upskilled
    • +
      Courses, Largest LMS
    • +
      Corporates, Global Clients
    STILL GOT QUERIES?

    Get a Live FREE Demo

    • Explore the trending and niche courses and learning maps
    • Learn about tuition fee, payment plans, and scholarships
    • Get access to webinars and self-paced learning videos
    Name
    Course *
    Email *
    Phone Number

    Find OSCP Online Training in Other Cities

    To meet the learning needs of people spread across various geographical locations, we are offering our high-quality training services at the location of your choice to ensure you obtain maximum impact for your training investment. Choose your city below.

    BangaloreChennaiHyderabad

    Training_Location

    Cyber Security and SIEM CoursesView All