OSCP
Exam Code: PEN-200
The most respected hands-on penetration testing certification. Prove your ability to identify vulnerabilities and execute attacks in a controlled environment.
Exam Code: PEN-200
The most respected hands-on penetration testing certification. Prove your ability to identify vulnerabilities and execute attacks in a controlled environment.
OSCP (Offensive Security Certified Professional) is widely considered the gold standard for penetration testing certifications. Unlike theory-based exams, OSCP requires you to actually hack into systems during a grueling 24-hour practical exam.
The OSCP motto is "Try Harder"—reflecting the determination needed to pass.
OSCP is designed for:
Prerequisites: While not required, you should have:
The OSCP exam is a 24-hour practical test:
| Background | Recommended Study Time |
|---|---|
| Active pentester | 3-4 months |
| Security professional | 4-6 months |
| Developer/sysadmin | 6-9 months |
| Beginner | Not recommended (build foundation first) |
The PEN-200 (OSCP) course includes:
| Certification | Style | Difficulty | Best For |
|---|---|---|---|
| OSCP | 100% practical | Advanced | Pentesters |
| CEH | Multiple choice | Intermediate | Broad knowledge |
| PenTest+ | MC + PBQ | Intermediate | Entry offensive |
The OSCP exam is unlike anything in the certification world. You receive a VPN connection pack via email at your scheduled start time. Once connected, you gain access to a network of target machines. You have exactly 23 hours and 45 minutes to compromise as many targets as possible and collect proof files (local.txt and proof.txt) from each. After the hacking phase ends, you get an additional 24 hours to write and submit a professional penetration testing report.
The exam environment is proctored via webcam and screen sharing. You must keep your camera on for the entire 24 hours. You can take breaks for food, coffee, and sleep, but your camera must remain active. The proctor will flag any suspicious activity.
Do not spend more than 2 hours on any single machine during your first pass. Start with the Active Directory set (40 points) because it offers the highest point value and, once you find the initial foothold, the chain of compromise often follows logically. Then move to the stand-alone machines. Aim to have 70+ points within the first 12 to 14 hours so you can spend the remaining time on documentation and any final attempts.
Take a 15 minute break every 3 to 4 hours. Eat real meals. Fatigue is the number one reason candidates fail who had the technical skills to pass. Many successful OSCP holders report sleeping for 3 to 4 hours during the exam and returning with fresh eyes to crack a machine they were stuck on.
The biggest mistake is rabbit-holing: spending 5+ hours on a single machine while ignoring easier targets. Another common failure is poor note-taking. If you cannot reconstruct your exploitation steps from your notes, you cannot write the report, and an incomplete report means lost points even on machines you compromised. Always document commands, screenshots, and output as you go.
The ideal OSCP preparation follows three phases: Foundation (1 to 2 months), where you build core skills in networking, Linux, and scripting; Course (2 to 3 months), where you work through the PEN-200 material and lab machines; and Practice (1 to 2 months), where you sharpen your skills on external platforms.
Included with OSCP:
External platforms (essential supplements):
Books:
| Background | Phase 1 (Foundation) | Phase 2 (Course) | Phase 3 (Practice) | Total |
|---|---|---|---|---|
| Active pentester | Skip | 2 months | 1 month | 3 months |
| Security professional | 1 month | 2 months | 1 to 2 months | 4 to 5 months |
| Developer/sysadmin | 2 months | 3 months | 2 months | 7 months |
Beyond the OffSec labs, build your own practice environment. Use VulnHub (free) to download vulnerable VMs. Set up an Active Directory home lab with at least two Windows machines and a domain controller; AD exploitation is now worth 40% of the exam.
OSCP is the most requested certification in penetration testing job postings. Roles that frequently require or strongly prefer it include: Penetration Tester, Red Team Operator, Offensive Security Engineer, Application Security Tester, and Security Consultant (offensive). At the senior level, OSCP is often the minimum baseline, with OSEP or OSED expected as additional qualifications.
| Region | Before OSCP | After OSCP | Increase |
|---|---|---|---|
| United States | $85,000 | $120,000 | +41% |
| European Union | EUR 55,000 | EUR 78,000 | +42% |
| United Kingdom | GBP 50,000 | GBP 72,000 | +44% |
| Remote (global) | $75,000 | $110,000 | +47% |
In offensive security hiring, OSCP is the single strongest signal on a resume. Recruiters and hiring managers know that an OSCP holder has proven they can independently compromise systems under time pressure. Unlike theory-based certifications, there is no way to pass OSCP without genuine hands-on ability. Many job postings in penetration testing list "OSCP or equivalent practical experience" as a hard requirement.
OSCP opens doors to mid-level and senior penetration testing roles immediately. From there, the typical path is: OSCP (Penetration Tester), then OSEP/CRTO (Senior Pentester/Red Team Lead), then management or specialization (AppSec, Cloud Security, or Red Team Director). Many OSCP holders transition into independent consulting within 3 to 5 years, where day rates range from $1,500 to $3,000.
| Item | Cost |
|---|---|
| PEN-200 Course + 90 days lab + 1 exam attempt | $1,649 |
| Additional lab time (30 days, if needed) | $359 |
| Retake exam attempt (if needed) | $249 |
| Hack The Box subscription (3 months) | $42 |
| Proving Grounds subscription (2 months) | $38 |
| Total (first attempt, minimal) | $1,691 to $1,729 |
| Total (with extra lab + retake) | $2,337 |
OSCP does not expire. Once earned, you hold it for life with no renewal fees, no continuing education requirements, and no annual maintenance. This is a significant advantage over certifications like CEH or Security+ that require periodic renewal.
With an average salary increase of $35,000 per year and a total investment of approximately $2,000, OSCP delivers a 1,650% return in the first year. For many professionals, OSCP represents the single highest-ROI career investment they will ever make. Even if you need two attempts, the ROI remains extraordinary.
OffSec occasionally runs promotions around Black Friday and during cybersecurity awareness month (October). The "Learn One" subscription ($799/year) provides access to PEN-200 plus other OffSec courses and is more cost effective if you plan to pursue OSEP or OSWP afterward. Some employers will fund OSCP preparation as professional development; present it as an investment that directly improves your organization's security testing capabilities.
Before purchasing PEN-200, you should be able to:
Schedule your exam only after you have: completed all PEN-200 exercises, compromised at least 40 OffSec lab machines, completed 20+ Hack The Box or Proving Grounds machines, and documented your methodology for each major attack type. If you can root a medium-difficulty Hack The Box machine in under 2 hours, you are likely ready.
OSCP is a test of persistence as much as skill. You will get stuck. You will feel frustrated. That is the point. The "Try Harder" mentality is not about brute force; it is about systematically enumerating every possibility before concluding you have hit a dead end. During the exam, if you feel stuck, walk away, take a break, and come back. Clarity often arrives after rest.
The exam machines are designed to be solvable with the tools and techniques taught in PEN-200. If you find yourself using obscure 0-day exploits or extremely complex attack chains, you are likely overthinking. The intended path is usually simpler than you expect.
Enumeration is everything. At least 80% of your time should be spent on information gathering and enumeration, not running exploits. The candidates who fail are typically the ones who jump to exploitation too quickly without thoroughly understanding what services are running and how they interact.
Your report matters more than you think. OffSec has failed candidates who compromised enough machines for a passing score but submitted inadequate reports. Use screenshots for every significant step. Document the exact commands you ran. Explain your reasoning.
Schedule your exam to start on a Friday or Saturday morning. This gives you the full 24 hours over a weekend when you are less likely to have work obligations. Start at 8:00 or 9:00 AM so your most productive hours align with the beginning of the exam when your energy is highest. Avoid starting in the evening; fatigue will compound as the night progresses.
Stop practicing 48 hours before the exam. Cramming new techniques at the last minute creates confusion. Instead, review your personal notes and methodology cheat sheets. Prepare your snacks, meals, and caffeine supply. Test your VPN client and webcam. Get two full nights of sleep. You have trained for months; trust your preparation.
Average Before
$85,000
Average After
$120,000
Average Increase
$35,000 (+41%)
Source: Offensive Security Career Survey 2024
OSCP is considered one of the hardest security certifications. It's a 24-hour practical exam where you must hack into machines and write a professional report.
Preparation varies: 3-4 months for active pentesters, 4-6 months for security professionals, 6-9 months for developers/sysadmins. Beginners should build foundations first.
For penetration testing roles, yes. OSCP proves practical hacking ability while CEH is theory-based. However, CEH is better for compliance-focused positions.
You can purchase additional exam attempts for $249 each. Many candidates fail their first attempt—it's expected and part of the learning process.
The world's most recognized ethical hacking certification. Learn to think like a hacker to better defend organizations against cyber attacks.
The intermediate penetration testing certification validating hands-on vulnerability assessment and management skills. A practical stepping stone to OSCP.