Offensive Security Engineering
What you'll learn
- Hacking
- Command and Control
- Red Team Operations
- DevOps
- System Administration
- Offensive Security
- Phishing
- Golang
- Terraform
- Saltstack
- Custom Implant Development
- Vagrant
- Serverless Framework
Requirements
- Familiarity with Metasploit
- Penetration Testing Fundamentals
- Intermediate Programming Skills
- System Administration Fundamentals
- Computer Networks
Description
The Offensive Security Engineering course focuses on the hands on skills it takes to run the infrastructure operations behind a "Red Team". This course will cover C2 frameworks such as Empire, Merlin, and even the Metasploit framework's C2 capabilities. In addition this course will cover multiple scenarios that will require students to configure custom drop boxes, reverse VPN tunnels, phishing campaigns, and more.
This course is great for those who are already in IT or Security and are looking to expand their horizons to learn how the back end of an offensive security operation works. Whether you're a software developer, system administrator, or a newfound penetration tester, this course is for you!
Who this course is for:
- Beginner Penetration Testers
- Experienced System Administrators
- Beginner Security Analysts
- Intermediate Security Engineers
- Software Developers
Instructor
Security Consultant with over 8 years in IT ranging from Software Development, Security Analysis (DFIR), Management, all the way to Offensive Security Engineering/Penetration Testing.
Casey has been hacking into systems across the every industry for around 6 years since his switch into offensive security and continues that journey everyday. In addition, he specializes in custom Offensive Security Tooling development.
Casey serves as the co-founder of DC706, volunteer staff on the Pros Versus Joes Red Cell, and is a bug hunter with the SRT. Casey was a speaker at DEF CON 27's first ever Red Team Village with his research titled "BadSalt (Adversarial DevOps)". He has also published several security vulnerabilities that have been publicly disclosed as CVE's, and as contributions to ExploitDB during his professional research. Casey is passionate about hacking, and is constantly contributing to the larger InfoSec community.
Professional Certifications: OSCP, eJPT, EU GDPR Foundation, LRPA