OSCP - Offensive Security Certified Professional Practice Test

โ–ถ

OSCP Training Programs and Certification Cost

The Offensive Security Certified Professional (OSCP) is widely considered the most respected hands-on penetration testing certification in cybersecurity. Unlike most certifications that test knowledge through multiple-choice questions, the OSCP exam is a 24-hour practical challenge where you must compromise a series of machines in a lab environment and document your findings in a professional penetration testing report. That format makes OSCP one of the few certifications that employers treat as direct proof of technical skill.

Getting to that exam requires going through Offensive Security's training ecosystem. The primary pathway is the PEN-200 course โ€” formerly called PWK (Penetration Testing with Kali Linux) โ€” which is the official training material for OSCP. Purchasing PEN-200 includes access to the course content, a virtual lab environment populated with deliberately vulnerable machines, and one exam attempt. The cost structure has evolved over the years, and in 2024 Offensive Security transitioned to a subscription model that changes how candidates access training and schedule exams.

This article covers what OSCP training actually costs, what the PEN-200 course includes, how long candidates typically spend preparing, and what free and low-cost supplementary resources are most useful for building the skills the exam requires. Whether you're planning to pursue OSCP in the next few months or just starting to research the certification landscape, understanding the full cost and time commitment upfront lets you plan a realistic preparation strategy.

It's worth noting that OSCP isn't an entry-level certification. Offensive Security explicitly recommends that candidates have experience with networking fundamentals, a working knowledge of Linux and Windows, basic scripting ability (Python or Bash), and familiarity with web application concepts before starting PEN-200. Candidates who start the course without that baseline tend to burn through their lab time trying to fill foundational gaps rather than learning the penetration testing methodology. Building that foundation first โ€” including time on platforms like TryHackMe or HackTheBox โ€” is generally better preparation than purchasing PEN-200 before you're ready for it.

In the cybersecurity job market, OSCP carries significant weight specifically because of its practical nature. Hiring managers at security consultancies, penetration testing firms, and in-house red teams know that passing OSCP requires actual exploitation skills โ€” not just knowledge of attack concepts. This makes it a more reliable signal of competence than certifications that can be passed through memorization alone. Many penetration testing job listings explicitly mention OSCP as a preferred or required qualification, and candidates who hold it consistently report that it opens doors that other security certifications don't.

OSCP is issued by Offensive Security, the same organization behind Kali Linux. OffSec has expanded its certification ladder over the years โ€” OSCP now sits in the middle of their offensive security pathway, with more advanced certifications like OSEP (Experienced Penetration Tester) and OSED (Exploit Developer) for candidates who want to go deeper after passing OSCP. But for most security professionals entering or advancing in penetration testing, OSCP is the primary milestone that establishes credibility in the field.

The 'Try Harder' philosophy โ€” Offensive Security's unofficial mantra โ€” reflects what the certification genuinely demands. The labs and exam are designed to be difficult, and the expectation is that candidates will struggle, get stuck, push through, and develop real problem-solving capability in the process.

Unlike programs that scaffold learners through every step, OSCP deliberately creates situations where you need to figure things out on your own. That philosophy is precisely what makes the certification respected, and it's worth understanding before you commit: OSCP is a substantial investment of time, money, and effort, and the payoff is a hands-on credential that genuinely demonstrates actual real-world technical penetration testing skill rather than the ability to pass a multiple-choice test.

Take a Free OSCP Practice Test

OSCP Certification Cost Breakdown

Offensive Security moved to a subscription model in 2023, replacing the previous one-time purchase options. There are currently two main subscription tiers for accessing PEN-200 and OSCP: Learn One and Learn Unlimited (also called OffSec Annual).

Learn One is priced at approximately $1,499 per year and provides access to a single learning path (such as PEN-200) plus one exam attempt. Additional exam retakes are purchased separately at around $249 per attempt. Learn Unlimited (approximately $5,499 per year) provides access to all OffSec courses, unlimited exam attempts within the subscription period, and access to their broader training library. For most candidates focused specifically on OSCP, Learn One is the standard starting point.

Before the subscription model, OffSec offered course bundles based on lab access duration: 30 days, 60 days, or 90 days of lab access. Candidates who purchased these packages owned the course materials for life but had time-limited lab access. If you see references to these pricing tiers in forums or blog posts, they refer to the legacy model. The current subscription model works differently โ€” you have access as long as your subscription is active, but the materials aren't yours permanently unless you have a legacy purchase.

Beyond the subscription cost, consider these additional expenses in your OSCP budget. First, supplementary training โ€” if you spend time on TryHackMe or HackTheBox before purchasing PEN-200, budget for their premium tiers ($14/month and $14/month respectively) during your pre-OSCP preparation phase.

Second, exam retakes โ€” at $249 per attempt, it's worth building that into your financial plan since a significant percentage of candidates don't pass on their first attempt. Third, equipment โ€” you need a stable machine capable of running Kali Linux either natively or in a VM, which most candidates who are already in IT roles have but worth confirming.

Total cost for most candidates: $1,499 for Learn One (includes first exam attempt) plus $0โ€“$500 in supplementary training and potential retake fees. Candidates who are well-prepared before starting PEN-200 tend to get more out of their lab time and have better exam pass rates, which makes pre-purchase preparation an investment that pays off in reduced total cost.

Some employers in cybersecurity reimburse OSCP training costs, particularly for penetration testers, red team members, and security engineers. If your employer has a professional development budget, it's worth requesting OSCP funding โ€” the certification is business-relevant and the cost is modest relative to other technical training. Government contractors and defense-sector employers may cover OSCP costs as part of 8570/8140 compliance efforts, since OSCP meets DoD Approved Baseline Certifications for certain work roles at the appropriate level.

If the upfront cost of Learn One is prohibitive, some candidates break preparation into phases: spend several months building skills on free and low-cost platforms first, then purchase the subscription only when they're confident they're ready to make productive use of the lab time. This approach takes longer but costs less โ€” you pay for PEN-200 once rather than extending or repurchasing because you weren't ready the first time. The community generally agrees that preparation-before-purchase is the financially smarter approach for most candidates.

Practice OSCP Exam Questions

PEN-200: What the OSCP Training Course Covers

PEN-200 is Offensive Security's flagship penetration testing course and the official training for OSCP. The course covers the full lifecycle of a penetration test: information gathering, enumeration, vulnerability identification, exploitation, post-exploitation, and documentation. It's organized as a self-paced learning experience combining PDF/video course modules with hands-on practice in the OffSec lab environment.

The course content covers penetration testing methodology, buffer overflow exploitation (both Windows and Linux), privilege escalation techniques for both operating systems, web application attacks (SQL injection, cross-site scripting, file inclusion, command injection), client-side attacks, tunneling and pivoting through networks, Active Directory attack techniques (a major addition in recent editions), antivirus evasion, and report writing. The Active Directory content was significantly expanded in recent PEN-200 updates to reflect how real-world penetration tests are structured โ€” most enterprise environments are Windows/AD environments, and understanding how to enumerate and attack AD is critical for the exam and the profession.

The lab environment is what sets PEN-200 apart from theoretical training. The labs are a virtual network of machines spanning different operating systems, configurations, and vulnerability types. Some machines require pivoting through intermediate systems; others require chaining multiple vulnerabilities to achieve full compromise. The offensive security certified professional oscp certification path is built around the assumption that you'll spend significant time in the labs โ€” not just reading the course material โ€” before attempting the exam.

Offensive Security recommends completing all module exercises and submitting them for the bonus points. This serves two functions: it ensures you've worked through all the course content systematically, and it adds up to 10 bonus points to your exam score if you also submit 10 proof screenshots from the practice labs. For candidates who are on the borderline between passing and failing, those bonus points can make a meaningful difference. Plan the bonus point work into your schedule from the beginning rather than trying to rush through exercises at the end of your preparation period.

One important PEN-200 content area that surprises candidates from a traditional network security background is the depth of web application coverage. Modern penetration testing engagements frequently include web applications โ€” internal admin panels, external-facing apps, APIs โ€” and the OSCP exam reflects this. The web app attack techniques covered in PEN-200 include SQL injection (both manual and tool-assisted), cross-site scripting, directory traversal, file inclusion vulnerabilities, command injection, and SSRF. If your background is primarily network-focused rather than web-focused, spending extra time on web app techniques before the exam is worth the investment.

Report writing is a component that many technical candidates underestimate until they're sitting in front of a blank document with 24 hours to go before the submission deadline. The OSCP report must document every machine you compromised: the scope, the methodology, the enumeration findings, the vulnerability exploited, the exploit walkthrough with screenshots, and remediation recommendations. A poorly written report on otherwise successful exploits can cost you passing points โ€” Offensive Security evaluates report quality as part of the overall assessment. Practice writing machine walkthrough documentation during your lab period, not for the first time during the actual exam.

OSCP Study Tips

๐Ÿ’ก What's the best study strategy for OSCP?
Focus on weak areas first. Use practice tests to identify gaps, then study those topics intensively.
๐Ÿ“… How far in advance should I start studying?
Most successful candidates begin 4-8 weeks before the exam. Create a structured study schedule.
๐Ÿ”„ Should I retake practice tests?
Yes! Take each practice test 2-3 times. Focus on understanding why answers are correct, not memorizing.
โœ… What should I do on exam day?
Arrive 30 min early, bring required ID, read questions carefully, flag difficult ones, and review before submitting.

OSCP Preparation Resources

๐Ÿ“‹ Free Resources

Several high-quality free resources help build OSCP prerequisite skills before purchasing PEN-200:

  • TryHackMe (free tier): Structured learning paths covering networking, Linux, web attacks, and basic exploitation. The 'Pre-Security' and 'Jr. Penetration Tester' paths are well-organized for beginners. Free tier has daily machine limits; premium ($14/month) removes them
  • HackTheBox (free tier): More challenging than TryHackMe. Free tier gives access to 'Starting Point' machines which are good for fundamentals. The harder 'retired machines' require VIP ($14/month)
  • OverTheWire Wargames: Free text-based Linux challenges. 'Bandit' is excellent for building command-line proficiency
  • PentesterLab (free tier): Web application exercises covering SQL injection, XSS, file inclusion, command injection
  • YouTube channels: IppSec (HackTheBox walkthroughs), TCM Security (TCM covers OSCP-relevant techniques), and John Hammond โ€” all free and extensively referenced by OSCP candidates
  • GitHub oscp-prep repos: Community-maintained resources, cheat sheets, and methodology guides shared by past OSCP candidates

๐Ÿ“‹ Paid Resources

Some paid resources are widely recommended in the OSCP community as valuable supplements to PEN-200:

  • TCM Security courses: Practical Ethical Hacking (PEH) course is frequently recommended as OSCP pre-prep. TCM's privilege escalation courses (Windows and Linux) are considered some of the best available for those specific topics
  • HackTheBox VIP ($14/month): Access to retired machines with community-written walkthroughs. Working through OSCP-difficulty retired HTB boxes is standard practice in the community
  • TryHackMe Premium ($14/month): Removes daily machine limits and unlocks additional learning paths
  • ProLabs (OffSec): OffSec's own additional lab environments (Offshore, RastaLabs, Skylark) are available separately and provide more complex, enterprise-like network scenarios for candidates who want more practice after completing the standard PEN-200 labs
  • PortSwigger Web Security Academy (free): Actually free but worth listing โ€” the best available resource for web application security concepts tested in OSCP

๐Ÿ“‹ Study Timelines

Typical OSCP preparation timelines vary significantly by experience level:

Beginner (no prior pentesting experience): 6โ€“12 months total. Plan 3โ€“6 months building fundamentals on TryHackMe/HTB before starting PEN-200. Then use the full Learn One lab period for PEN-200 work. Don't rush โ€” starting PEN-200 before you're ready wastes expensive lab time.

Intermediate (some CTF/HTB experience, IT background): 3โ€“6 months total. 1โ€“2 months refreshing skills on HTB retired machines + OSCP-specific technique study, then purchase PEN-200 and spend 2โ€“4 months in the labs.

Experienced (IT/security professional, scripting experience): 2โ€“4 months total. May be able to start PEN-200 directly and use the lab time efficiently. Still recommend doing some HTB machines and reviewing privilege escalation techniques before the exam.

Most community advice suggests scheduling your exam only when you can reliably compromise 3โ€“4 machines in the practice labs without hints. The '5 machines in 24 hours' pressure test is real โ€” time management under stress is a significant factor in exam performance.

Maximizing Your OSCP Lab Time

The PEN-200 lab environment is the core differentiator of OSCP training โ€” there's no substitute for hands-on practice against real (deliberately vulnerable) machines. Getting the most out of your lab time requires approaching it systematically rather than randomly hacking machines and hoping skills develop organically.

Start with the course material before touching the labs. It's tempting to jump straight into hacking machines, but the course modules are structured to build skills sequentially, and trying to solve lab machines without the relevant technique knowledge is frustrating and inefficient. Complete each module, do the exercises, then apply what you've learned in the labs. This approach takes longer upfront but produces better retention and better exam performance.

Keep detailed notes from day one. Document every machine you compromise: the enumeration output, the vulnerability you identified, the exploit you used, the commands you ran, and the proof screenshots.

Good notes serve multiple purposes โ€” they help you build the report-writing muscle you need for the exam, they help you remember techniques when similar situations arise in later machines, and they're the raw material for your exam report if you find a machine on exam day that's similar to one you practiced on. Many OSCP candidates use a note-taking system like CherryTree, Obsidian, or Notion specifically for their lab notes.

Use the hint system strategically. OffSec's forums provide hints for lab machines, and using them isn't cheating โ€” it's appropriate when you've genuinely exhausted your ideas and are stuck. The goal is learning, not proving you can solve everything without help. That said, when you do use a hint, make sure you understand why the technique works, not just that you applied it. Exam machines won't come with hints, so understanding the underlying reasoning is what transfers to exam performance.

Attempt the machines in order of difficulty if you're new to the labs. The machine descriptions indicate difficulty levels, and starting with easier machines builds momentum and reinforces fundamentals before you encounter more complex chaining scenarios. As your skills develop, working on harder machines becomes more productive because you have more techniques in your toolkit to attempt.

Time management under exam conditions is a distinct skill from technical ability, and the labs can help you practice it. Some candidates set artificial time limits on lab machines โ€” giving themselves a set number of hours per machine โ€” to simulate exam pressure. Others practice the report-writing workflow specifically, timing how long it takes to write up a complete machine compromise. Knowing that report writing alone might take 2โ€“4 hours means budgeting your 24-hour exam window very differently than if you plan to hack right up to the deadline.

The enumeration mindset is what the PEN-200 course builds most importantly, and it takes time to internalize. In early lab attempts, many candidates rush past enumeration to try exploits. Experienced penetration testers know that thorough enumeration is what surfaces the actual attack path โ€” and that random exploit attempts without solid enumeration waste time.

If you're stuck on a machine, the answer 90% of the time is to enumerate more thoroughly. This lesson โ€” that the path forward is hidden in plain sight in the enumeration output โ€” is the core thing that separates candidates who pass OSCP from those who struggle.

OSCP Preparation Checklist

Build Linux and Windows fundamentals before purchasing PEN-200 โ€” command line proficiency is assumed
Complete TryHackMe Jr. Penetration Tester path or equivalent before starting PEN-200
Practice on HackTheBox retired OSCP-difficulty machines (search 'OSCP-like HTB list' for curated collections)
Review Windows and Linux privilege escalation techniques โ€” these are heavily tested
Learn Active Directory basics: enumeration with BloodHound, common attack paths
Study web application attacks: SQLi, XSS, file inclusion, command injection
Plan to complete all PEN-200 exercises for bonus points โ€” don't leave this to the last week
Practice report writing on practice machines before the exam โ€” report quality affects your score
Schedule the exam only when you can reliably compromise 3โ€“4 practice machines without hints
Budget for potential exam retake โ€” plan $249 in reserve and don't treat first attempt as a test run
Test Your OSCP Knowledge

OSCP Pros and Cons

Pros

  • OSCP has a publicly available content blueprint โ€” you know exactly what to prepare for
  • Multiple preparation pathways accommodate different schedules and budgets
  • Clear score reporting shows specific strengths and weaknesses
  • Study communities share current insights from recent test-takers
  • Retake policies allow recovery from a difficult first attempt

Cons

  • Tested content scope requires substantial preparation time
  • No single resource covers everything optimally
  • Exam-day performance can differ from practice test performance
  • Registration, prep, and retake costs accumulate significantly
  • Content changes between versions can make older materials less reliable

OSCP Training and Cost Questions and Answers

How much does OSCP certification cost?

OSCP is accessed through Offensive Security's subscription model. Learn One costs approximately $1,499/year and includes PEN-200 course access, the lab environment, and one exam attempt. Additional exam retakes cost $249 per attempt. Learn Unlimited (approximately $5,499/year) includes all OffSec courses and unlimited exam attempts during the subscription period. Most candidates start with Learn One.

What is PEN-200 and how does it relate to OSCP?

PEN-200 is Offensive Security's penetration testing course โ€” the official training for OSCP. Purchasing PEN-200 (through an OffSec subscription) gives you access to course content covering the full penetration testing lifecycle, a virtual lab environment of deliberately vulnerable machines, and one OSCP exam attempt. PEN-200 was previously known as PWK (Penetration Testing with Kali Linux).

How long does it take to prepare for OSCP?

Preparation time varies by experience: 6โ€“12 months for beginners with no prior penetration testing experience, 3โ€“6 months for candidates with CTF/HTB backgrounds and solid networking/Linux skills, and 2โ€“4 months for IT/security professionals. Most candidates spend time building skills on TryHackMe or HackTheBox before purchasing PEN-200, then use the lab period to work through the official course and practice machines.

What is the OSCP exam format?

The OSCP exam is a 24-hour practical challenge. You receive access to a virtual environment with an Active Directory set (worth up to 40 points) and three standalone machines (20 points each). Passing score is 70/100. After the 24-hour hacking window, you have 24 hours to submit a professional penetration testing report documenting your findings. Candidates who complete all PEN-200 exercises can earn up to 10 bonus points.

What's the best OSCP training path for beginners?

For beginners, the recommended path is: (1) Build Linux/networking fundamentals using TryHackMe's free and premium paths, (2) Complete TCM Security's Practical Ethical Hacking course for OSCP-relevant technique coverage, (3) Practice on HackTheBox retired machines at OSCP difficulty (plenty of curated lists available online), (4) Purchase PEN-200 subscription and work through the course systematically with lab practice, (5) Attempt the exam after you can consistently compromise practice machines without hints.

What free resources help prepare for OSCP?

The most useful free resources include TryHackMe (free tier with daily machine limits), HackTheBox Starting Point machines, OverTheWire Wargames (especially Bandit for Linux), PortSwigger Web Security Academy (excellent for web app attacks), and YouTube channels IppSec and John Hammond (HackTheBox walkthroughs and technique explanations). Many past OSCP candidates also share notes and methodology guides on GitHub.

How hard is the OSCP exam?

OSCP is widely considered one of the more challenging technical certifications in cybersecurity. Community estimates suggest roughly 50โ€“60% of candidates pass on their first attempt, though this varies significantly by preparation level. The 24-hour time pressure, report writing requirement, and need to chain multiple techniques together make it demanding. Well-prepared candidates who have spent substantial time in the PEN-200 labs and can reliably compromise OSCP-difficulty machines in practice consistently report better outcomes.
โ–ถ Start Quiz