Instructor: Chris Traynor
Course Length: 8 Hours
Includes: Six months of complimentary access to the Antisyphon Cyber Range, certificate of participation, six months access to class recordings.

Course Description
Information security is an increasingly important field, as the amount of data being transmitted and stored digitally continues to grow. In order to protect this data from unauthorized access, it is important for individuals and organizations to have a strong understanding of the tools and techniques used by attackers.
The Intro to Offensive Tooling training course will cover the basics of common offensive tools, including Nmap, Recon-ng, Metasploit, proxychains, Responder, and many more. The tools discussed are used by security professionals to identify vulnerabilities and exploit them in order to test the security of a system or network. The class will cover an overview of each tool, its key features and functionality, as well as practical exercises to reinforce how they can be used in a real-world scenario. Participants will also learn best practices for using these tools responsibly and within the bounds of ethical hacking.
Key Takeaways
- A solid foundation in offensive tooling
- How to use these tools to assess the security of their own systems
- Be better equipped to protect against cyber threats
Who Should Take This Course
- General security practitioners
- Penetration Testers
- Red Teamers
- Blue Teamers looking to broaden their knowledge
- Application developers & QA
Audience Skill Level
Beginner to Moderate skill level
Student Requirements
- Basic knowledge of networking
- Basic knowledge of web applications
What Each Student Should Bring
- Stable internet access
- A computer with a minimum of 8GB of memory (16GB is recommended)
- An up-to-date Operating System
- VMWare Player/Fusion/Workstation
- Administrator access to your computer
- Kali VM or Instructor provided VM
What Students Will Be Provided With
- Slide deck and links to all the material and tools needed with instructions
- Virtual machine with all the necessary tools and targets for the course.
Trainer & Author

Chris Traynor began working for Black Hills Information Security (BHIS) in July 2022 as a Penetration Tester, where he is responsible for Pen Testing web apps, APIs, and networks. Chris has over 15 years of experience in Web/Mobile App development, QA Automation, and Penetration Testing. He is also a TA for SEC504, SEC542, & SEC560 with the SANS Institute where he is working on becoming an instructor. Chris is an active member of the GIAC Advisory Board, InfraGard, and The Open Organization Of Lockpickers (TOOOL). He thinks the best part of working at BHIS is being surrounded by some of the best minds in the industry (and getting paid to break stuff). When he’s not hard at work, Chris enjoys adventuring with his wife and daughter, exercising, and driving his Jeep.
Live Training Events
This class will be taught as part of
the Antisyphon Most Offensive Con that Ever Offensived! Summit,
March 1-3, 2023.