
The Offensive Tooling Foundations workshop will cover the basics of common offensive tools used by security professionals to identify vulnerabilities and exploit them, as well as ways to utilize them more efficiently.
Course Length: 4 Hours
Includes a Certificate of Completion
Next scheduled date:
Description
The Offensive Tooling Foundations workshop will cover the basics of common offensive tools used by security professionals to identify vulnerabilities and exploit them, as well as ways to utilize them more efficiently.
Covering topics from reconnaissance and scanning to exploitation and password attacks. We’ll discuss an overview of each tool, its key features and functionality, as well as practical exercises to reinforce how they can be used in real-world scenarios.
This workshop aims to provide an experiential approach to building your offensive toolkit foundation while executing them within the bounds of ethical hacking.
System Requirements
-
Student/Lab Requirements:
- Stable internet access
- A computer with a minimum of 8GB of memory (16GB is recommended)
- An up-to-date Operating System
- VMWare Player/Fusion/Workstation
- Administrator access to your computer
- Instructor provided VMs
-
Student's should have...
- Familiarity with virtual machines and lab environments is helpful
- Basic understanding of networking and Linux CLI
Syllabus
Modules:
-
- Password Attacks
-
- Course Introduction
-
- Reconnaissance
-
- Discovery
-
- Scanning
-
- Auxiliary Tools
-
- Exploitation
FAQ
Penetration Testers
Red Teamers
Blue Teamers looking to broaden their knowledge
Application developers & QA
About the Instructor

Chris Traynor
Bio
Chris began working for Black Hills Information Security (BHIS) in July 2022 as a Penetration Tester, where he is responsible for Pen Testing web apps, mobile app, APIs, and networks. Chris has over 15 years of experience in Web/Mobile App development, QA Automation, and Penetration Testing. Chris is an active member of the GIAC Advisory Board, InfraGard, and The Open Organization Of Lockpickers (TOOOL). He also authors and teaches two Antisyphon classes: Intro to Offensive Tooling and Advanced Offensive Tooling.
Related products
-
Multiple InstructorsLiveOD
OWASP Top 10 with Jim Manico
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: AI Foundation: Cyber Security Workflow Optimization using AI Technology with Joff Thyer and Derek Banks
View Course -
Multiple InstructorsLive
Workshop: Investigating M365 Business Email Compromise with Patterson Cake
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: Exploiting AI with Ben Bowman
View Course This product has multiple variants. The options may be chosen on the product page