Information security is an increasingly important field, as the amount of data being transmitted and stored digitally continues to grow. In order to protect this data from unauthorized access, it is important for individuals and organizations to have a strong understanding of the tools and techniques used by attackers.
The Intro to Offensive Tooling training course will cover the basics of common offensive tools, including Nmap, Recon-ng, Metasploit, proxychains, Responder, and many more. The tools discussed are used by security professionals to identify vulnerabilities and exploit them in order to test the security of a system or network. The class will cover an overview of each tool, its key features, and functionality, as well as practical exercises to reinforce how they can be used in a real-world scenario. Participants will also learn best practices for using these tools responsibly and within the bounds of ethical hacking.
Register: https://www.antisyphontraining.com/intro-to-offensive-tooling-w-chris-traynor/
Information security is an increasingly important field, as the amount of data being transmitted and stored digitally continues to grow. In order to protect this data from unauthorized access, it is important for individuals and organizations to have a strong understanding of the tools and techniques used by attackers.
The Intro to Offensive Tooling training course will cover the basics of common offensive tools, including Nmap, Recon-ng, Metasploit, proxychains, Responder, and many more. The tools discussed are used by security professionals to identify vulnerabilities and exploit them in order to test the security of a system or network. The class will cover an overview of each tool, its key features, and functionality, as well as practical exercises to reinforce how they can be used in a real-world scenario. Participants will also learn best practices for using these tools responsibly and within the bounds of ethical hacking.
Details
Related Events
RE//verse
February 24, 2025 - March 1, 2025