OSCE
E721402
OSCE (Offensive Security Certified Expert) is an advanced penetration testing certification from Offensive Security that validates a professional’s ability to exploit complex security vulnerabilities in real-world environments.
Statements (46)
| Predicate | Object |
|---|---|
| instanceOf |
information security certification
ⓘ
penetration testing certification ⓘ professional certification ⓘ |
| abbreviationOf | Offensive Security Certified Expert NERFINISHED ⓘ |
| assessmentType | exploit development and penetration testing challenges ⓘ |
| difficultyLevel | advanced ⓘ |
| examDuration | 48 hours ⓘ |
| examFormat |
hands-on practical exam
ⓘ
remotely proctored exam ⓘ |
| examRequirement |
independent problem solving
ⓘ
time management under pressure ⓘ |
| field |
cybersecurity
ⓘ
offensive security ⓘ penetration testing ⓘ |
| focus |
advanced penetration testing skills
ⓘ
exploitation of complex security vulnerabilities ⓘ real-world penetration testing scenarios ⓘ |
| fullName | Offensive Security Certified Expert NERFINISHED ⓘ |
| geographicScope | international ⓘ |
| hasFormat | online exam ⓘ |
| issuer | Offensive Security NERFINISHED ⓘ |
| language | English ⓘ |
| learningApproach |
hands-on
ⓘ
lab-based ⓘ |
| offeredBy | Offensive Security NERFINISHED ⓘ |
| organizationCountry | United States NERFINISHED ⓘ |
| orientation | offensive security NERFINISHED ⓘ |
| prerequisiteRecommended |
OSCP
NERFINISHED
ⓘ
strong knowledge of penetration testing methodologies ⓘ |
| providerType | private training organization ⓘ |
| relatedCertification |
OSCP
NERFINISHED
ⓘ
OSEE NERFINISHED ⓘ OSWE NERFINISHED ⓘ |
| reputation | highly respected in the penetration testing community ⓘ |
| requires |
documenting exploitation steps
ⓘ
producing a professional penetration test report ⓘ |
| targetAudience |
experienced penetration testers
ⓘ
security professionals ⓘ |
| validatesSkill |
ability to bypass security controls
ⓘ
ability to exploit security vulnerabilities ⓘ ability to identify security vulnerabilities ⓘ advanced exploit development ⓘ client-side attacks ⓘ network penetration testing ⓘ post-exploitation techniques ⓘ web application exploitation ⓘ |
Referenced by (1)
Full triples — surface form annotated when it differs from this entity's canonical label.