Offensive Security Certified Professional
Who this exam is for
The Offensive Security Certified Professional certification is designed for professionals who work with or want to work with OffSec technologies in a professional capacity. It is taken by cloud engineers, DevOps practitioners, IT administrators, and technical professionals looking to validate their expertise.
You do not need extensive prior experience to attempt it, but you will benefit from hands-on familiarity with the subject matter. The exam tests applied knowledge and architectural judgment, not just memorization. If you can reason about trade-offs and real-world scenarios, structured practice will handle the rest.
Domain breakdown
The OSCP (PEN-200) exam is built around official domains, each with a fixed percentage of the question pool. This distribution should directly inform how you allocate your study time.
Note the domain with the highest weight — many candidates under-invest here because it feels conceptual. In practice, this is where the exam is most precise, with scenario-based questions that test specifics.
What the exam actually tests
This is not a memorization exam. Questions require applied judgment under constraints. Almost every question includes a scenario with explicit requirements and asks you to select the most appropriate solution.
Here are examples of the question types you will encounter:
How to prepare — 4-week study plan
This plan assumes one hour per weekday and roughly 30 minutes of lighter review on weekends. It is calibrated for someone with some relevant experience. If you are starting from zero, add an extra week before Week 1 to familiarise yourself with the basics.
- Complete PEN-200 modules 1-10: enumeration methodology, Nmap mastery, and web application attack chapters
- Practice LFI/RFI, SQL injection, and command injection on OffSec provided practice machines
- Build and practice your enumeration methodology: what you run on every port, in what order
- Complete at least 5 lab machines in the PEN-200 labs — document every step
- Master Windows 32-bit buffer overflow from scratch: fuzzing, bad char identification, finding JMP ESP, and shellcode generation
- Study service exploitation: identifying version-specific CVEs, using Exploit-DB, and modifying public exploits
- Practice privilege escalation on multiple machines: install LinPEAS/WinPEAS and understand their output
- Complete 10+ lab machines targeting different vulnerability types
- Study AD enumeration: BloodHound/SharpHound data collection, attack path analysis, and domain mapping
- Practice Kerberoasting, AS-REP Roasting, Pass-the-Hash, and Pass-the-Ticket attacks in lab environments
- Cover DCSync attack, Golden/Silver ticket concepts, and domain persistence mechanisms
- Complete OffSec AD lab sets and at least 2 practice AD environments (HTB Pro Labs or similar)
- Attempt a full exam simulation: 24 hours, 3 standalone machines + 1 AD set, completely isolated
- Write a complete penetration test report from your simulation — practice executive summary and technical sections
- Review all failed attack paths from simulation; identify methodology gaps and weak areas
- Ensure you can reliably complete a buffer overflow exploit in under 2 hours and enumerate AD in under 1 hour
Common mistakes candidates make
These patterns appear repeatedly among candidates who resit this exam. Knowing them in advance is worth several percentage points.
Is Certsqill right for you?
Honestly: Certsqill is built for candidates who have already done some studying and want to convert knowledge into exam performance. If you have never touched the subject, start with a foundational course first — then come to Certsqill when you are ready to practice.
Where Certsqill is strong: question depth, AI-powered explanations, and domain analytics. Every question is mapped to the exam blueprint. When you get something wrong, the AI tutor explains why the right answer is right and why each wrong answer fails under the specific constraints in the question.
Where Certsqill is not a replacement: video courses and hands-on labs. Use Certsqill to test and sharpen — not as your first exposure to a topic you have never encountered.