Join us for Wild West Hackin’ Fest Deadwood virtual conference! Register Here

Offensive Tooling Foundations with Chris Traynor

Course Authored by .

As the amount of data being transmitted and stored digitally continues to grow, individuals and organizations need to have a strong understanding of the tools and techniques used by attackers.

On-Demand $295.00

Course Length: 8 Hours

Includes a Certificate of Completion



Next scheduled date: Content is loading, please wait.

Description

As the amount of data being transmitted and stored digitally continues to grow, individuals and organizations need to have a strong understanding of the tools and techniques used by attackers.

The Offensive Tooling Foundations training course will cover the basics of common offensive tools, including Nmap, Recon-ng, Metasploit, proxychains, Responder, and many more. The tools discussed are used by security professionals to identify vulnerabilities and exploit them in order to test the security of a system or network. The class will cover an overview of each tool, its key features and functionality, as well as practical exercises to reinforce how they can be used in a real-world scenario. Participants will also learn best practices for using these tools responsibly and within the bounds of ethical hacking.

System Requirements
  • Hardware/Software Requirements
    • Stable internet access
    • A computer with a minimum of 8GB of memory (16GB is recommended)
    • An up-to-date Operating System
    • VMWare Player/Fusion/Workstation
    • Administrator access to your computer
    • Kali VM or Instructor provided VM

FAQ

Key Takeaways
• A solid foundation in offensive tooling
• How to use these tools to assess the security of their own systems
• Be better equipped to protect against cyber threats
Who Should Take This Course
• General security practitioners
• Penetration Testers
• Red Teamers
• Blue Teamers looking to broaden their knowledge
• Application developers & QA
Audience Skill Level
Beginner to Moderate skill level
Student Requirements
• Basic knowledge of networking
• Basic knowledge of web applications
What Students Will Be Provided With
• Virtual machine with all the necessary tools and targets for the course
• Slide deck and links to all the material and tools needed with instructions

About the Instructor

Pixel splash background
Chris Traynor
Chris Traynor
Bio

Chris began working for Black Hills Information Security (BHIS) in July 2022 as a Penetration Tester, where he is responsible for Pen Testing web apps, mobile app, APIs, and networks. Chris has over 15 years of experience in Web/Mobile App development, QA Automation, and Penetration Testing. Chris is an active member of the GIAC Advisory Board, InfraGard, and The Open Organization Of Lockpickers (TOOOL). He also authors and teaches two Antisyphon classes: Intro to Offensive Tooling and Advanced Offensive Tooling.

On-Demand

Antisyphon's On-Demand classes give you flexible, self-paced access to the same high-quality training our live events are known for. Whether you're diving into forensics, cloud security, or offensive tooling, each course includes:

  • Full access to video recordings, slides, and downloadable resources
  • Hands-on labs and virtual machines to reinforce real-world skills
  • Cyber Range access for immersive practice (select courses)
  • Dedicated Discord support from instructors and peers
  • Certificates of participation upon completion

Start learning when it works for you!
No deadlines, no pressure. Just real, practical cybersecurity training on your schedule.

Purchase:
Content is loading, please wait.
Shopping Cart

No products in the cart.