Information security is an increasingly important field, as the amount of data being transmitted and stored digitally continues to grow. In order to protect this data from unauthorized access, it is important for individuals and organizations to have a strong understanding of the tools and techniques used by attackers.
The Intro to Offensive Tooling training course will cover the basics of common offensive tools, including Nmap, Recon-ng, Metasploit, proxychains, Responder, and many more. The tools discussed are used by security professionals to identify vulnerabilities and exploit them in order to test the security of a system or network. The class will cover an overview of each tool, its key features and functionality, as well as practical exercises to reinforce how they can be used in a real-world scenario. Participants will also learn best practices for using these tools responsibly and within the bounds of ethical hacking.
Instructor: Chris Traynor
Course Length: 8 Hours
Tuition: Lifetime Access $295 USD
This page is for the On-Demand version of this course. Please check our Live Events Calendar for any live presentations of this class currently scheduled.
Key Takeaways
- A solid foundation in offensive tooling
- How to use these tools to assess the security of their own systems
- Be better equipped to protect against cyber threats
Who Should Take This Course
- General security practitioners
- Penetration Testers
- Red Teamers
- Blue Teamers looking to broaden their knowledge
- Application developers & QA
Audience Skill Level
Beginner to Moderate skill level
Student Requirements
- Basic knowledge of networking
- Basic knowledge of web applications
What Each Student Should Bring
- Stable internet access
- A computer with a minimum of 8GB of memory (16GB is recommended)
- An up-to-date Operating System
- VMWare Player/Fusion/Workstation
- Administrator access to your computer
- Kali VM or Instructor provided VM
What Students Will Be Provided With
- Slide deck and links to all the material and tools needed with instructions
- Virtual machine with all the necessary tools and targets for the course.
About Our On-Demand Courses…
Learn at your own pace with access to course content, lectures, and demos in the Antisyphon On-demand learning platform. Many courses are offered with lifetime access to the course and content updates. On-demand courses include content update alerts, access to dedicated support channels in the Antisyphon Discord server, a certificate of completion, and complimentary access to the Antisyphon Cyber Range*.
* Cyber Range access and other course features may vary from course to course. See the specific details for each course on its registration page.
QW50aXN5cGhvbiBPbi1EZW1hbmQ=
Trainer & Author
Chris Traynor began working for Black Hills Information Security (BHIS) in July 2022 as a Penetration Tester, where he is responsible for Pen Testing web apps, APIs, and networks. Chris has over 15 years of experience in Web/Mobile App development, QA Automation, and Penetration Testing. He is also a TA for SEC504, SEC542, & SEC560 with the SANS Institute where he is working on becoming an instructor. Chris is an active member of the GIAC Advisory Board, InfraGard, and The Open Organization Of Lockpickers (TOOOL). He thinks the best part of working at BHIS is being surrounded by some of the best minds in the industry (and getting paid to break stuff). When he’s not hard at work, Chris enjoys adventuring with his wife and daughter, exercising, and driving his Jeep.