Skip to main content

Offensive Security Methodologies for Security Professionals

Offensive Security Methodologies for Security Professionals teaches the processes threat actors use to break into organizations’ networks and steal their most sensitive data. Utilizing industry-standard penetration testing and auditing software, students will learn to identify, scan, and enumerate target systems, correlate services to vulnerabilities and exploits, employ exploits to gain access to the target systems, elevate privileges, propagate through the network, and cover their tracks within a target network. This course is focused primarily on Linux and Windows operating systems, so students should be comfortable with both.

Request Course Details

Attending students will learn

  • Identify the classes of hackers, their motivations, and the methodologies employed by threat actors
  • Use publicly available tools and open source intelligence techniques to develop a target footprint
  • Scan and enumerate targets to identify target operating systems and services
  • Research and leverage exploits for vulnerable services to achieve access to target systems
  • Identify system configuration weaknesses and viable privilege escalation tactics
  • Analyze exploited systems to identify and remove indications of compromise
  • Employ system tools to exploit additional targets within an internal network

Who should attend

  • Incident responders who need to understand and react to IDS alerts
  • Network defenders seeking to understand common access methods
  • Security managers who desire to improve their defensive model
  • Security operations center staff seeking to identify signs of compromise
  • New members of penetration testing and vulnerability assessment teams


Although no specific courses are required, students should have some level of experience with Microsoft Windows and Linux operating systems as well as a basic understanding of TCP/IP networking.

Request More Info About This Course

contact Focal Point

tweets by @FocalPointDR

Loading Tweets...