A quick look at the Offensive Security Certifications

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
going live on a friday you guys it's we made it to friday it's the 11th of december the month is kicking on next month next week we'll be halfway there not hopefully living on a prayer but we know christmas is right around the corner days till christmas count them down kids are excited kids are ready to go the christmas season oh it's christmas christmas some folks we're on our second day of hanukkah if you're of the jewish faith sonic is going on too uh christmas around the corner kwanzaa it's the season of all the different holidays and festivals it's a bit crazy a bit crazy of course you know what's crazy these these guys certifications offensive security good morning eric good to see you offensive security they man and you think maybe i held them till friday because they're red and we wear red on friday friday we wear red pet fridays remember those folks that are deployed nah that's not why we held them for the end we have to if we're going to be serious about putting together these career paths starting next week and we might have to start later in the week maybe we'll have to start on tuesday and then push it off into the week of christmas i might actually take that week off i don't know we may end up putting some of the training paths back because i still want to cover sans and i still want to cover ec council but for sure for sure i want to cover offensive security offset morning mike it's good to see you think about these guys richard's just coming in too morning richard thing about these guys is you can't talk about serious pen testing without talking about offensive security i mean pen test plus is good um ec council ceh is good those are like entry level those are starting up g-pan from sans is good um ec council has the uh licensed fan tester lpt i think they may have changed the name of that one that's good but they're all they all in my opinion pale in comparison to these guys now there's some new new ones coming out um maybe we can talk about those there's new certifications that make it put a good run for it they they all are a little pale compared to the offensive security courses the some of the content you hear some of the comments you'll hear about their advanced courses and i haven't taken any advanced courses um just things like now that's over i'll sit in the corner and cry and these are from people that passed it uh these courses although we'll talk talk about them like oscp or or what comes from the class pen testing with cali is their their baseline certification that's their easiest certification and it's a bear it's a monster and then they go up from there it gets harder from there so they'll call they call it oscp their entry level certification it is not if you're talking about pen testing oscp is not entry level pen test certification that's if you've been around a while advanced pet testers a lot of advanced protesters don't have it um so there's some some requirements some folks talk about like the legal requirements to conduct pen testing a lot of times you need to have ceh and you have to have g pen from sans um that's the legal one if you go talk to somebody that's in the field somebody that's running a penetration testing team uh if they see offensive security certifications on someone's resume they are gonna know that that person understands the concepts of penetration testing and i'm not just talking about the technical part of it but as we look at these certifications you're going to see offensive security makes you do the paperwork too you don't get away with just just going in taking a multiple test multiple choice tests or taking uh fill in the blank test or even practical exercises this whole thing the entirety of the certification is a practical exercise and you'll see you'll see when we dive in there even the easiest one is going to wear a lot of people out um and i'll give you my disclaimer i have taken uh pen testing with backtrack the older course when i was doing pen testing i never would have never got around to taking the certification because it looms at you it's out there waiting so this year i'll be taking pt pen testing with with cali and then probably one of the more advanced ones later in the year but it's a monster when you go through the course and you study and you study and you think you're ready we'll get we'll get into it we get in there but it was it loomed i put it off i put it off until the the ability to take the test expired and i couldn't take the test because uh and it's just it's one thing you gotta dive in there and do it this if you're worried about a plus or you're worried about security plus or you're worried about cissp this one these these these ones these certifications are the ones that get keep a lot of people up at night like the guy like one quote says just sit in the corner and cry um today is international mountain day if you need to know what your holiday is for today international mountain day so let's roll the intro and then we'll talk about uh this certification one second i gotta at class last night i was teaching class and i have to change my setup all around because webex is terrible so it makes me change everything around so let's talk about offensive securities certifications there we go got a button not working sticky button that's not good keep stuff from working right throws off the throws off the rhythm of the morning but it's friday we're gonna get through this we'll be through it and before you know we'll know a lot about that's not right what do we got going on here you got a picture and a picture look like looking down a mirror on a mirror so what we're talking about is offensive security and their bouquet of certifications so this overview this is a high level overview remember we're going to come back later and look at these certifications in detail later but this has to be the we're setting the stage so that you understand the basics of these certifications before we talk about the career paths so you got to know the basics you got to know the basics of these and you've got to know the basics of offensive security certifications if you're going to talk seriously about working in the world of pen testing red teaming or even i would say we could even use this in control assessment well that's not as in-depth and detailed as you need for this so let's kick this show off and talk about offensive security so offensive securities in an american company working in information security pen testing and digital forensics got a weird square bracket there that's because this this write-up came from wikipedia and that was the reference operating from around 2007 the company created open source projects advanced security courses exploit db a vulnerability database and the cali distribution right you know the cali distribution anybody that's doing pen testing knows the cali distribution kali linux these guys these guys here offensive security created and maintain cali so if you talk about anything to talk about these guys are the guys to go to for pen testing experience so if you're taking if you are serious about this career track if you're serious about the working in pen testing and i'm saying if you're at zero now if you don't know anything at all about security and you want to be a pen tester your path i would say is at a minimum of five years long to get to where you need to be a good pen tester and be able to compete on these things i keep getting that i need okay not bad thought a double screen going on it's just a picture anyways just a technical difficulties back here so you're gonna need to go through this you need to you need to go through some of the base stuff you have to do the security plus you're gonna have to do ceh probably you're gonna have to maybe do pen test plus um i would say go through and do g pen from sans first and then tackle these guys i would tackle these guys three to four years into your security career that you've been around a while you're going to have to start learning scripting start learning how to use cali and linux as a general linux and cali specifically learn some of the tools there's a ton of tools on linux on the the cali distro before you jump into these courses and this is you know we talk about kali linux and this the framework around uh the the course where you're going to take for is is framework around kali linux and that's a good thing because that's what most people in the field use if you're in pen testing you're probably going to use catalytics of some some way shape or form they offer if you want the distros they offer the distros the distributions of catalytics you can get from offensive security as well so you can go there and download download a virtual machine download the iso or the disk image get it for different devices they keep uh they maintain linux kali linux very very well so here's the lineup there's five courses and five certifications that you can get from offensive security oscp o s w p o s w e o s p o s e p and the master the mother of all of them the the monster that that he would keep you up at night the o s e e if you're a person out there and you're working in pen testing and you see somebody with o s e e um yeah they they know their stuff this most mostly windows exploit but most of the world is wednesday windows 80 90 percent of the environments windows that os ee focuses on windows but you've got to get there you have to go through uh attacking linux machines and things like that um so let's look at these things let's start with their baby this is the one everything starts with here they don't they bring offensive security do not recommend you take any classes or certifications until you have taken uh pen testing with cali or penetration testing kali linux their pen 200 course so the first bullet is the course that teaches you this so you take the course and then you can sit for the certification so certification simulates a live network in a separate vpn or virtual private network which contains a small number of vulnerable vulnerable machines once you sit for the certification after you've taken the course once you start your certification you'll have 23 hours and 45 minutes to complete the challenge itself that's showing you know what you're doing showing you know what you've learned in the pen 200 course showing you know how to do to execute a penetration test so you have 23 hours and 45 minutes to do the test and then you've got 24 hours to send your documentation to the offensive security challenges department and that's your report get that not easy not an easy course to go through this your training is 17 hours of video an 850 page pdf course guide over 70 virtual machines you can deal with active student forms and access to the virtual lab environment and that last one do not overlook that that's going to be where you're going to go in there and get your chops the training if it's anything close to the pen tasting with with with backtrack that i took years ago it was exceptional training it's on par with the sand stuff but as you're going to see it is it's pricey but it's less far less than the sans course and this is a good certification this certification will set you apart in the penetration testing field and in the security field as a general so so the packages this is where you're really going to want to look at you want to look at the package and i would say if i was taking it and when i go to take it later this year i'm going to do that third package the pen 200 with 90 days of lab access and the oscp examination fee 13.49 that's essentially what you're doing if you can do it faster if you can vote devote your time the first one for 9.99 90 days lab access the lab access is the only difference here um but you're going to you're going to have to be hustling you need time in the lab you need time in the lab going over this stuff you got to gotta be yes just spend the time i'm saying a month to a month and a half maybe two months of two hours a day consistently five days a week i would say i would say maybe even leave your weekends alone but two months if you leave your weekends alone two hours a day to be ready to take this exam now the second block there retake fees you might as well just plan on doing a retake just plan on taking a retake um that way if you need it you got it so if you for me i'm going to plan on 1349 i'm going to plan 150 just for a retake fee just in case right if you need more time in the lab you can buy more time in the lab 30 60 and 90 day blocks for 359 599 and 7.99 and then you can upgrade so if you have taken [Music] one of the earlier versions like like me i took the say i passed the certification had i taken in past certification i would have been one of those bottom ones pen trusting with backtrack probably it was version two it had been 500 for me to upgrade version 3 400. if i took the earlier version of pentest 200 upgrading the the earlier version of pen testing with cali to the latest version is 199 there's a lot of new material that in 2020 they updated the entire course so there's brand new stuff in there it's good it's good information so again this is their bottom level certification and it's a bearer um if you see anybody's got oscp give them thumbs up they're good to go they've got it taken care of they they they know what they're doing because you have to go in and prove you know what you're doing it's not a brain dump it's not a cram you can't go in there and and you know be ready the night before you have to spend consistent time in the lab you have to pay attention to their courseware and then you have to spend time in the lab doing what they teach you and you just got to do it so for 90 days i'll probably spend an hour at two hours a day in their labs just just working around the constructs and the things that they have taught great certification and even if you don't take the certification you might say well when i took the pen testing with cali course what's the value if you don't take certification there is a ton of value even if you don't go through the certification the training itself is worth the 1000 bucks look at you know a course at sans is seven thousand dollars this is one seventh of that i i can't give these guys enough praise um great courseware the next one is wireless attacks or pen 210 this is the uh offensive security uh like wire looks professional i thought i had it on there um oh yeah white's on top sorry i didn't put on top offensive security wireless professional has a four hour time limit requires you connect to a to our dedicated lab by ssh secure shell you'll encounter several wireless networks varying configurations conduct wireless information gathering and implement various attacks to get access to the target networks as part of the exam again you must submit a comprehensive penetration test report it should contain in-depth notes and screenshots detailing your findings including the steps you took to crack each network in this one you get about three and a half hours of instructional video a 380 page course guide active student forums and access to a home lab setup so you're not going to get access to the home their lab until you go to take the exam um you gotta do four you gotta do it in four hours this one's not 24 hours their short one is four hours right this is their their short course um three and a half hours instructional video again you have to spend time in the lab so um it's 450 to take the the course and the exam certification feed fee if you're upgrading from the earlier version it's going to be 100 bucks and a retake fee for this one is 150 this is called they call wi-fi foo if you ever hear them talking about that they're talking about the oswp this is a new course um this was part of cracking the perimeter of course the offensive security had in the past um the course you'll take is evasion techniques and breaching defenses or penetrate or pen 300 this one is a 48 hour exam it consists on hands-on web application assessment in our vpn isolated vpn within the exam environment students attack various web applications and operating systems so both web and os points rewarded for each compromised application based on their difficulty and level of access obtained so think about that you've got to do web attacks and system attacks so you have to do both of the you should do you don't have to do you should do both of the previous courses and certifications before you sit for this one all right this one you get 10 hours of video series a pdf about 410 pages pft pdf course guide private labs active forms and access to the virtual lab environment so this is kind of the top certification in their pen testing track right in the pen testing track this this is the top of that that track um and i'm not saying this top of their environment but or their certification world but this top in their track right so here's the package you can take you get the course 60 days lab access and osep examination fee for 12.99 or 90 days of lab access for 14.99 you see that on here they don't even offer 30 days you're like no 30 days you're not even getting it you're not going to get you gotta do 90 or 60 days um retex retest retest fees 200 bucks and then you can extend the lab 30 60 or 90 days for five at the same price we saw before 359 599 or 7.99 again if i was doing something like this i would probably plan on 180 days or or 120 days i would spend some time getting ready for this one um maybe i can take that back maybe if you've done them kind of fairly close together if you've done the first two and this one you'd have hours in the lab from oscp and then you get this one offensive security experience penetration tester that's exactly what you would be if you are coming out of this one um you will be seen as an experienced pen tester yeah kid not kidding yet so after their their web specific web uh certification there was a little one talk you talked about earlier you know talked a little bit about that one in um in that last uh certification this class is the uh advanced web attacks and exploitation web 300. notice we changed the the prefix now we're in the web track so this is the offensive this is the wrong hold on guys i've got the wrong information here and i apologize i'm gonna just escape here why do i have the wrong stuff i guess because it was late last night when i was putting this together and i have no excuse for it let me get you that there's not uh web 300 stick with me for a second here i'll get you the right let me actually let me see something i might have no i didn't didn't flip those around let me get you the right information cause i have the wrong information here how did that mix that up remember i remember copying this yesterday trying to do two things at one time that'll get you every time so let's fix this just this part here is wrong there we go let's get back to the show now sorry about that folks so this is a 48-hour exam consisting of hands-on web application assessments in our iso isolated vpn network with the exam environment students attack various web applications and operating system points awarded for each compromised system right um and the difficult based on difficult difficulty level uh students who obtain the points and need to need to pass students who need who if you get the points you need to pass you must submit a web application assessment report in-depth notes and screenshots detailed the findings and this exam is proctored we talk about these reports they you're getting graded on the report as well so you can do excellent in the actual attack but you have to do the paperwork too and that's important because a lot of people think they're going to get into pen testing and it's just doing the attack it's just doing the technical stuff i'm gonna tell you the technical stuff is like 25 or 30 of what you're going to do you're going to do a lot of writing in penetration testing in this course you get 19 hours of video 700 page pdf course guide active student forums access to virtual labs all that stuff here's your rundown uh web 300 with your lab access 30 days an exam fee 9.99 60 days 12.99 90 days 14.99 retake fee is 200 bucks extensions uh 30 60 90 or 500 700 900 nice even numbers now and then if you're upgrading from the earlier version with lab access 30 days lab access 99 60 day lab access 299 90 day lab access 4.99 if you're upgrading from the earlier version so getting the course material getting the lab time so you got to go in the lab and redo it so upgrading upgrading in these worlds is not upgrading like in other world so if you're upgrading here you've got to go back in lab you got to back in the lab and prove it so the last one the last one um o s e e o s e offensive security exploitation expert this is a crazy one right so this one is advanced windows exploitation exp 401 advanced windows exploitation is a particularly demanding penetration testing course and re requires at a significant amount of student and instructor interaction therefore we limit awe courses to live hands-on environments at black hat las vegas nevada so of course you have to go to las vegas unless you have enough people they'll come to you if you have enough people to teach it as you see on their website right now they're going to london to teach it in london otherwise you've got to go to black hat and the hardest part you know i have not don't get me wrong i have not taken this one but according to people that have taken it the hardest part i guess one of the hardest parts i should say the hardest part part of the difficulty in this one is it sells out almost immediately so at black hat you got to be there early you got to be able to you got to be in line you got to get this one if you don't make it they just sell out and that's it okay you can't pre-buy it you got to buy it you got to buy it from black ad offensive security doesn't control the registration to this it's all controlled by black hat and you've got to go there to take it in class with an instructor no online version and you take the test right there it's the hardest course we offer it requires significant time investment st students need to commit to reading case studies and reviewing the provided reading material each evening so you're going to go through training all day long and then at night you're going to just be reading the virtual lab environment has a limited number of target systems the software within contains specific unknown vulnerabilities and students have 72 hours to develop and document exploits the exam requires stable high-speed internet connection and you must submit a comprehensive penetration penetration testing report as part of the exam should contain in-depth notes and screenshots detailing the steps taken and exploitation methods used on offensive security site they don't tell you how much this course cost and i think that's because it may vary from year to year given that it is taught at black hat and is this really off the screen what in the world guys is it really showing up off the screen how is that happening i can't i can't adjust it there let me go back to it i can't believe it's it really it really is off the screen um part of the display settings here i guess so let me do this let me let me end it and escape out of this and bring you back to this view just the powerpoint view so you can see you can see this zoom in there we go we're just doing that sorry guys so it's it's 5 000 according to this guy it has motion this is the on his linkedin account he has a description of his experience at black hat taking the os e and that's where he's that's where i got the 5 000 figure from um you can spend a lot of you this one is top of the line for offensive security if you go look at this guy this guy has a very detailed overview of what he went through what it was all about um and how he signed up for it the course and everything this is uh the top of their line so let me roll up to this one did this one get call cut off too full screen does it so this is their lineup this is offensive securities lineup um these first oscp osw p o s w e e oh and excuse me that's os c p o s w p and o s ep are their pen testing courses those are all in line then there's the web exploit and then finally at the top of their list is the o-s-e-e a little a little bit of powerpoint problems this morning guys apologize for that what are your thoughts on offensive security stuff the stuff that offensive security offers these courses these certifications what do you guys think um if you see these on people's resumes you'll know they they've been around a bit been around understand what's going on i don't know i i yeah i'll back on the horse i'll be on the back on the poor horse doing oscp this year uh finishing out i've been doing this stuff like you said you know i've i've been doing this stuff for 30 years guys and just just taking their finally getting around taking their base certification again i'm taking the course 17 certification that's part of what we're doing at my day job we're over doing this nc worker good morning good morning good to see you so that's where we're at that's what we're talking about this morning that rounds out the week of talking about um talking about certifications i know we got a little bit more to talk about but that's i mean this at this point we can talk about career tracks i probably will i will spend some time spend some time um yes there there is there's a website for their certifications um it's offensive dash security dot com put that on the screen here's my overlays overlay this is them offensive security.com will take you to their site these guys are they've got awesome certifications um how to jump from rmf just to do penetration tests um i talked about in the video in in life are you talking about just in what we're talking about here in the mornings we're talking about certifications this week so that's how we got to penetration testing this is um yeah okay mike rephrase it yeah if you if you're if you're interested in penetration testing you've got to get give these guys you know get on get on those certifications um i wouldn't jump right into them i wouldn't have your first certification that's for sure um at work at work um i've been uh i guess it's because the work i did in the army so in the army i was on the army red team uh supported that through the my army reserve affiliation and did some pen testing there did some wireless pen testing um got into it there i did worked with a uh in a pen testing world in the intelligence community doing pen testing there um and it's just security i've been a a i've been around security since it was starting and seeing a lot of these things grow so yeah i do a lot of i do a lot of rms stuff but i do a lot of security stuff too so in my day job i'm an engineer and our the engineering team i run has penetration testing as well so we do engineering and penetration testing as well as regular security control assessments and risk management as well we have actually a separate function that does risk management but yeah just just i've been doing this for a long long time um and that's how i've done pen testing and risk management i've done pretty much everything in security because i've seen it grow now some definitely folks in the field have been around longer than i have and have more experience i'm not gonna and i haven't focused just on one area so i've been doing different things for 30 years so i've been all over the place the stories that we could talk about over beer sometime or your favorite beverage would would be pretty good um so we were on a technical development team was on a uh at the time the reserve company that i was in when i got out of the active component went in the reserves actually after 9 11 when i did breaking surface i came back after 9 11 and joined the unit and then jumped to a unit was part of information operations command and the company that i was part of was a computer network attack company they've changed the names of these things since then now they they became dynamic defense and then they became something else that well well after i left but it was a computer network attack company and it was kind of when this stuff was just starting when the uh certifications around the stuff was just spinning up so i've done a lot guys um yeah mike i agree meet up somewhere and do it over adult beverages when all this lockdown's over that's for sure um yeah so i've done risk management i've done pure risk management i've done um ism and izzo work i've done penetration testing i've done um gosh nate just about everything tech writing instructional stuff but now i'm at i've done this stuff for 30 years and i've got to this point in my career this is the point i need to share what i can with the people coming up now um there was no path some of these some of these things didn't exist well many of these things didn't exist when i started it was infosec back then maybe we're an infosec um so we'll build the past we'll build a framework that can get younger people into the field and get them where they need to go so they're not wandering around part of the reason i did so many things is because the field was evolving the field was growing and part of this was because there was no there was no road map i would um at this a lot of years out here in dc in the dc area as a consultant or a contractor and the way that world that's a dangerous world but it's you're going to get a lot of experience because you'll go you'll come out on one contract when that contract's up you have to find another job so you find another job in security it may be doing something totally different but you're still qualified for it so you go do that for a couple years then you go to something else for a couple years heck i've built audit programs for a couple years um your stuff you're just consulting contracting you're going to go from job to job and you can do different things some people in the field are very very focused they started out pen testing 20 years later they're still doing pen testing and they can tell you everything that you need to know about pen testing across the board honestly i'm going to say i'm more of a generalist i know a lot about the different areas in security but for you guys i want to make sure you have paths if you want to be a pen tester let's lay out the path here's what you need to do from start day one to you know five or ten years in after that it's kind of a it's kind of a crap shoot after that who knows what things are going to be like in 10 years right um if you want to be in izzo what's our lead we'll take izzo izzo and security analyst do you want to be that track what's that look like if you want to be in leadership what's that look like if you want to be in forensics what does that look like that's a tougher field though we won't spend a lot of time building that one because an area i'm not really deep in i've spent some time doing forensics but as it relates to pen testing so that's where we're at it is friday i'm glad you guys could be here this morning glad we could talk about this stuff but let's wrap this up let's get on with it yeah jack of all trades yeah master of none maybe that's what they say um again in security they want technology they call it general if you become a generalist you look know a little bit about a bunch of stuff it is mike it's a jack of all trades i spent a lot of time risk management the reason we see you seem i focus more on risk management is because there's not a lot of people focusing on risk management i was around when rmf started i helped create some of the documentation like was on the task force that helped create 853 revision for the older catalog not the new one and uh brought a lot of the communities uh into rmf helped bring fbi into artwork i guided the fbi into rmf and a couple other organizations i can't talk about so and there's there's a need for generals but there's need for the general send it more in the the leadership track honestly and people that focus on the technical end up in highly technical positions um but there's a way you progress either way some fields if you end up in the technical side of it you can only go so far uh in security there's real no top if you're a highly experienced penetration tester or forensics person or any other field that you can keep just keep moving up and up and up there's more there's always more to learn if you go the other track if you end up in the leadership side of it and sometimes you end up the leadership side of it on accident um but you don't know there's always positions up there's management directorships um csos cisos there's all kinds of positions to move through so that's what i'm gonna say and that's we'll start talking about next week we'll start talking about next week we'll start talking about these career paths how do you get from where you're at today and i'm gonna assume everybody i'm just gonna assume everybody's starting at zero and then you can put yourself out on the path wherever you're you're actually at and this is gonna be the path that as i see the world so i'd love to hear your feedback as we build the pass but that'll be next week monday we'll start that and we'll figure out when we're going to talk about sans and ec council but this week we have if you haven't seen them already we've talked about today obviously we talked about offensive security uh yesterday we talked about isc square day before isaka and before that we talked about comptia and their certification you should have an understanding of all those certifications now so when we start throwing them on the screen next week it should be good to go that being said take care of your friends your family co-workers have a good weekend if you can hit the subscribe button that's down there by the red coffee um subscribe button hit the thumbs up uh share with your friends if you can hit the bell to be notified all the things that youtubers say helps the channel helps with our logarithm helps us get uncovered and all that stuff i interview for jobs every week and uh they need people across the board yeah yeah and the funny thing is you know the next year in 2021 they say four million jobs short in security um where they're all at i don't know there's gonna be some probably all across the board but mike you're right across the board people are looking and i gotta tell you i gotta tell you guys um and we talked a lot about higher education college degrees and i had a position i've got the my the engineers that are on the team i work with uh my team are are advanced they're they're top of their game they've been around a long time and we're looking to fill a position we filled the position i think we filled it yesterday and um you know a lot of people are yeah yeah you got it a lot of the people on the team have master's degrees and bachelor's degrees a lot of master's degrees um the guy we hired has an associate's degree and he just he's got the skills i would have hired him without a degree at all because he's got the skill set and he could have got that on his own um a lot of stuff is you can download you can download kali linux you can download nessus you can download quality you can use quals in their sandbox you can download and use splunk all these tools you can download is finding time building the plan and starting using the tools that's that's really what next week is all about you know there's going to be a tool you need to learn if you're if you're talking about pen testing you've got to get cali cali is free it runs in a virtual environment it runs as a live disk it'll run on an old machine build a virtual lab go to town get get hands-on ton of tools in there we're going to talk about all that there's a ton of tools but anyways i'm going to leave you with that as we talked about sorry about the technical hiccups this morning that happens sometimes but anyways i say take care of your friends family co-work take care each other this is the community join us on the facebook channel if you want to talk more about this keep the conversation going if you want to listen to it in the audio only format we do push it out on all of the uh podcast environments you can go find us on um all of those places you get your podcast from i'm not sure even what all of them are we use the distribution service so it just pushes them out everywhere after nine o'clock it'll go out to everybody so until monday we'll see you guys have a great weekend be safe out there and uh take care of you take care of your friends man take care everybody we'll see you then you
Info
Channel: Cyber-Recon
Views: 2,146
Rating: 4.9322033 out of 5
Keywords: offensive security, cyber security, penetration testing, oscp certification, ethical hacking, offensive security certified professional, cyber security certifications, penetration testing tools, OffSec, OSCP, OSWP, OSEP, OSWE, OSEE
Id: liOSIcnMKso
Channel Id: undefined
Length: 43min 12sec (2592 seconds)
Published: Fri Dec 11 2020
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.