ProfessionalVendor-neutralOffSec· issued from US

OSCP

Offensive Security Certified Professional

Hands-on penetration testing — exploitation, privilege escalation, AD attacks.

Exam fee
$1,649
Ongoing
$0/yr AMF · 30 CPE/yr
Study time
300–600 hrs
Delivery
Hands-on practical lab
Validity
3 yrs (renewal cycle)

› Quality score

34.5 / 40

Four-axis SecProve rubric, each 0–10. SecProve editorial assessment — each axis carries a written justification so you can push back on any single call without dismissing the whole score.

Blueprint rigor
How well-defined and rigorous the exam blueprint is.
PEN-200 syllabus is public and comprehensive; covers Linux/Windows/AD/web.
8.5/10
Practical evidence
Hands-on labs / written reports vs pure MCQ.
23h45 live lab against multiple machines + AD set + 24h report. Closest thing to real pentest work in the cert market.
9.5/10
Currency & upkeep
How aggressively content is kept current with the field.
PEN-200 refreshed in 2023; lab content kept current with modern AD attack chains.
7.0/10
Market recognition
How often this signal actually moves a hiring decision.
The universally-cited offensive-security floor. Listed on most pentester job posts. [Holders: 30k, 2024-12]
9.5/10

› Market signals

public, citable inputs to the recognition score
Holders worldwide
30,000
as of 2024-12 · source

Estimate from OffSec community; OffSec doesn't publish exact counts.

› Built for these roles

Penetration TesterRed Team OperatorApplication Security Engineer (offensive)Security Consultant (offensive)

› Exam format

23-hour, 45-minute hands-on lab exam. Compromise a series of machines and an Active Directory set, then write a professional penetration-test report within 24 hours of finishing the lab. Bonus points for completing the PEN-200 lab exercises before the exam.

Passing score
70 / 100 points across the 24-hour exam
Retake policy
Fee: $249 per attempt
Wait: 0d between attempts

Course bundle includes one exam attempt. Retake voucher is $249 separately. No wait period beyond exam scheduling.

› Recertification

Recertify by earning 90 OffSec Continuing Education (CE) credits over the three-year cycle (avg 30/yr) — credits come from re-testing, content contributions, or completing other OffSec courses. No annual maintenance fee.

› NICE Framework work roles

The NIST NICE work-role IDs this cert maps to. NICCS lookup.

PD-WRL-007PD-WRL-002
Recognition
GlobalUSEUUK
Exam languages
en

› Core domains covered

The 4 domains this cert is centrally about. Passing the exam demonstrates working knowledge of each.

› Also touched

Present in the blueprint but not the primary focus — you’ll be introduced but shouldn’t expect depth.

› Known coverage gaps

Domains this cert does not meaningfully address. Plan follow-up learning here if your role touches any of them.

› Prerequisites

Experience

Strong Linux and networking fluency required. Comfort with CLI, scripting, and reading code. Not for absolute beginners.

Knowledge assumed
  • Linux and Windows administration
  • Networking and TCP/IP
  • Scripting (Bash, Python)
  • Active Directory fundamentals

› Progression

requiredrecommended

Where this cert fits in the typical learning path. Required edges are vendor-gated; recommended edges reflect de facto industry progression.

Required prereqs (0)

No vendor-gated prereqs.

Recommended priors (2)
OSCP
OffSec
Required by (0)

No certs require this one.

› Study materials

Curated starting points. Not exhaustive — vet each against your learning style and the current exam version.

› Version & lifecycle

Current version
PEN-200 (2024)
Released
2024-03

Active Directory exploitation introduced in 2023 update; course refreshed 2024.

› Salary signal

Penetration tester / red team operator, US, 3–5 years.

$110K$170K
median $135K

Robert Half Salary Guide + Glassdoor 'Penetration Tester' aggregations · 2024 · US base only · p25–p75 range

› How it compares

vs
HTB CPTS

HackTheBox's CPTS is a more modern lab-first alternative — newer brand but cheaper and arguably broader.

↔ Compare side-by-side
vs
CEH

OSCP is hands-on lab-graded; CEH is theory-heavy and widely seen as a checkbox cert.

↔ Compare side-by-side
vs
OSEP

Next OffSec rung — evasion + AD-heavy. Take after OSCP, not instead.

↔ Compare side-by-side

› Careers that commonly pursue this cert

Penetration Tester

Ethically hack systems to find vulnerabilities before attackers do. Offensive security requires deep technical knowledge.

Vulnerability Management Lead

Owns the end-to-end find → prioritize → fix → verify loop at scale, now increasingly AI-driven.

Threat Exposure Management / Attack Surface Analyst

External-first role: inventories what an attacker can see, tracks what's new, and drives closure through the org. The outside-in counterpart to vuln management.

See this cert’s domains highlighted on the interactive map, or compare it against the rest of the catalog.