Join us for Wild West Hackin’ Fest Deadwood virtual conference! Register Here

HackerOps with Ralph May

Course Authored by .

In this training, we learn the fundamentals of DevOps and how we can code our tactics, techniques, and procedures (TTPs).

On-Demand $575.00

Course Length: 16 Hours

Includes a Certificate of Completion



Next scheduled date: Content is loading, please wait.

Description

In this training, we learn the fundamentals of DevOps and how we can code our tactics, techniques, and procedures (TTPs).

Today, to be an advanced and effective attacker, you need to move fast, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources, the days of manual setup are long behind us.

To conduct an advanced attack, you need more than just a collection of simple scripts. In addition to talent, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement, the more time we need. Time is something we don’t have a lot of on an engagement.

Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share.

In this class, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly, we will work through multiple labs and examples that you can take with you for your next engagement.

System Requirements
  • Hardware/Software Requirements
    • x86-compatible or x64-compatible 2.0 GHz CPU minimum or higher
    • 8 GB RAM or higher required
    • 40 GB available hard drive space
    • Windows 10 (This training utilizes VMware Workstation Player to run two different VMs)

FAQ

Key Takeaways
After having taken this course, students should have:

• A thorough understanding of advanced attack infrastructure
• A full methodology for building red team resources
• Instructions and sample code on how to build out full attack infrastructure and how to integrate TTPs
Who Should Take This Course
• Penetration testers
• Red teamers
• Ethical hackers
• General security practitioners
Audience Skill Level
There is no particular skill level necessary to take this course.
Student Requirements
Students should have general Windows / UNIX command line skills in order to complete all of the hands-on labs.
What Each Student Should Bring
• A credit card (You will be signing up for cloud service accounts such as Microsoft Azure and AWS. These services require a credit card for signing up.)
• Before registering, please check that both Amazon AWS and Microsoft Azure services are available in your country. (Note that if you cannot sign up for these services you will not be able to participate in the labs)

About the Instructor

Pixel splash background
Ralph May
Ralph May
Bio

Ralph May is a security analyst and penetration tester at Black Hills Information Security. Before joining BHIS, Ralph spent the last five years delivering penetration tests on a wide range of security assessments. These assessments include physical, wireless, network, social engineering, and full simulation red teams. Before focusing on security, Ralph worked as a system administrator and as a network engineer for both civilian and government employers. Ralph is a US Army veteran who previously worked with the United States Special Operations Command (USSOC) on information security challenges and threat actor simulations.
Ralph has contributed to multiple open-source security tools and spoken at numerous security conferences. He’s a lifelong learner and finds joy in discovering how technology truly works. When Ralph is away from the keyboard, he likes the outdoors, boating, exercising, and spending time with his family.

On-Demand

Antisyphon's On-Demand classes give you flexible, self-paced access to the same high-quality training our live events are known for. Whether you're diving into forensics, cloud security, or offensive tooling, each course includes:

  • Full access to video recordings, slides, and downloadable resources
  • Hands-on labs and virtual machines to reinforce real-world skills
  • Cyber Range access for immersive practice (select courses)
  • Dedicated Discord support from instructors and peers
  • Certificates of participation upon completion

Start learning when it works for you!
No deadlines, no pressure. Just real, practical cybersecurity training on your schedule.

Purchase:
Content is loading, please wait.
Shopping Cart

No products in the cart.