Courses • Intermediate • Lab-first
OSCP is about methodology under pressure. This program is built around repeatable enumeration, exploitation, Linux/Windows privilege escalation, buffer overflow practice, pivoting basics, and exam-style reporting.
✓ Lab-first • ✓ OSCP methodology • ✓ Mock exam • ✓ Reporting templates
OSCP tests your ability to approach unknown networks systematically under time pressure. This course focuses on (1) a repeatable methodology and (2) the practice hours needed to execute it calmly.
Modular curriculum aligned with OSCP-style expectations: structured recon, patient exploitation, reliable privilege escalation, and clean reporting.
Points, time management, reporting rules, common failure patterns, and a realistic study plan.
Kali setup, VPN workflow, tooling, and building your notes/report template (Markdown/CherryTree/Obsidian).
Nmap strategies, service enumeration, web enum, SMB/FTP/SSH checks, and per-host checklists.
OSCP-style bugs: outdated CMS, misconfigs, uploads, SQLi basics, safe usage of public exploits.
Pattern/EIP control, bad chars, shellcode placement, and building a final exploit in an exam-friendly way.
SUID/cron/PATH/NFS, misconfigured services, kernel paths, and building your workflow cheatsheet.
Service misconfigs, unquoted paths, weak perms, token impersonation, scheduled tasks, lab-style mapping.
SSH tunnels, proxychains, chisel basics, and “network inside network” practice scenarios.
Screenshot discipline, step-by-step writeups, report format, and exam-day decision making.
OSCP is passed in labs, not slides. You’ll follow a clear routine for using your practice time efficiently.
Short tasks covering recon, one privesc, and a mini write-up. Build OSCP thinking as a habit.
Multiple variations to rehearse the full BoF chain until it becomes automatic.
Timed run simulating exam pressure: prioritize boxes, manage time, produce partial reports.
No one can guarantee a pass. What we build is skill level, stability under pressure, and exam strategy.
You’ll know how to start, how to treat each host, and how to avoid time sinks.
Enumeration → exploit → privesc becomes routine for both Linux and Windows.
Your own notebook + report skeletons that translate directly into exam docs.
Choose a batch style that fits your routine.
| Mode | Duration | Details |
|---|---|---|
| Weekend cohort | 5–7 weeks | Sat–Sun live + labs + weekly exam-style tasks |
| Weekday evenings | 4–6 weeks | Short lessons + labs between sessions |
| Self-paced | Flexible | Recorded + optional doubt-clearing (batch-based) |
OSCP prep pricing depends on mentoring level. Choose the support you want.
No honest course can guarantee a pass. We focus on skills + habits + exam strategy that make passing realistic.
Recommended but not mandatory. We guide practice across labs and help align OffSec lab time for maximum benefit.
If you’re brand new, we suggest foundations first (Linux + basic web/app). Share your background and we’ll advise.
For most cohorts, yes. Exact details depend on the batch you join.
Reach out for batch dates, syllabus, and a clear suggestion based on your current level and timeline.