Monday, May 12, 2025
HomeCyber Security NewsKali Linux Team to Offer Free Access to Penetration Testing Course

Kali Linux Team to Offer Free Access to Penetration Testing Course

Published on

SIEM as a Service

Follow Us on Google News

Free Access to Penetration Testing Course, Kali Linux, has announced that they will be releasing a free video training course later this month on Penetration Testing with Kali Linux (PEN-200/PWK), which will be offered in the form of a live-streamed course.

During the course, you will be prepared to take the Offensive Security Certified Professional (OSCP) examination, which was conducted in person before the pandemic started.

Free Cyber Security Training

While live training ended for a period of time during the pandemic, companies created programs that would be available remotely or online instead.

- Advertisement - Google News

Offensive Security launched the ‘OffSec Academy’ in support of this transition, which is an online course consisting of 13 weeks in length that prepares users for the OSCP examination.

As part of OffSec’s recent announcement, the company will now be live-streaming its online offering through the Twitch streaming platform ‘OffSec Live,’ which is an evolution from its online offering.

Free Access to Penetration Testing Course

OffSec Academy will stream the PEN-200 sessions twice weekly on Twitch for 60 minutes each, and everyone can attend these Free Access to Penetration Testing

Moreover, the Offensive Security Discord server allows participants to converse with instructors and peers on a real-time basis.

The Twitch streams are open for anyone to watch and follow along on their own whenever they want. Offensive Security has created an online lab and training materials to help students prepare for the course but only enrolled students will have access to the material.

The OffSec Live

From June 22nd, 2022 through November 30th, 2022, members of the PEN-200 class will be able to stream every Wednesday and Friday from 12:00-1:00 PM ET.

PWK’s OffSec Academy has been ascertained to be a cohesive and effective way for individuals to achieve their professional goals. PWK looks forward to teaching future classes and working with future students.

You can follow us on LinkedinTwitter, and Facebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques

Sophos Managed Detection and Response (MDR) in September 2024, the notorious Lumma Stealer malware...

New Noodlophile Malware Spreads Through Fake AI Video Generation Platforms

Cybercriminals have unleashed a new malware campaign using fake AI video generation platforms as...

Kimsuky Hacker Group Deploys New Phishing Techniques and Malware Campaigns

The North Korean state-sponsored Advanced Persistent Threat (APT) group Kimsuky, also known as “Black...

APT37 Hackers Use Weaponized LNK Files and Dropbox for Command-and-Control Operations

The North Korean state-sponsored hacking group APT37, also known as ScarCruft, launched a spear...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques

Sophos Managed Detection and Response (MDR) in September 2024, the notorious Lumma Stealer malware...

New Noodlophile Malware Spreads Through Fake AI Video Generation Platforms

Cybercriminals have unleashed a new malware campaign using fake AI video generation platforms as...

Kimsuky Hacker Group Deploys New Phishing Techniques and Malware Campaigns

The North Korean state-sponsored Advanced Persistent Threat (APT) group Kimsuky, also known as “Black...