Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Life Purpose Meditation Emotional Intelligence Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Ethical Hacking

Offensive Security Engineering

A hands on instructive course for what it takes to support offensive security operations.
Rating: 4.2 out of 54.2 (283 ratings)
15,483 students
Created by Casey Erdmann
Last updated 5/2020
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Hacking
  • Command and Control
  • Red Team Operations
  • DevOps
  • System Administration
  • Offensive Security
  • Phishing
  • Golang
  • Terraform
  • Saltstack
  • Custom Implant Development
  • Vagrant
  • Serverless Framework
Curated for the Udemy for Business collection

Requirements

  • Familiarity with Metasploit
  • Penetration Testing Fundamentals
  • Intermediate Programming Skills
  • System Administration Fundamentals
  • Computer Networks

Description

The Offensive Security Engineering course focuses on the hands on skills it takes to run the infrastructure operations behind a "Red Team". This course will cover C2 frameworks such as Empire, Merlin, and even the Metasploit framework's C2 capabilities. In addition this course will cover multiple scenarios that will require students to configure custom drop boxes, reverse VPN tunnels, phishing campaigns, and more.


This course is great for those who are already in IT or Security and are looking to expand their horizons to learn how the back end of an offensive security operation works. Whether you're a software developer, system administrator, or a newfound penetration tester, this course is for you!

Who this course is for:

  • Beginner Penetration Testers
  • Experienced System Administrators
  • Beginner Security Analysts
  • Intermediate Security Engineers
  • Software Developers

Course content

13 sections • 23 lectures • 4h 43m total length

  • Preview05:21
  • Terraform Primer
    22:28
  • Serverless Framework Primer
    14:07
  • AWS Primer
    13:50

  • Networks Refresher
    07:35
  • Networks Refresher Quiz
    3 questions

  • Basics of Command and Control (C2)
    11:04
  • C2 Quiz
    3 questions

  • Reverse VPN Tunneling
    20:34
  • Configure Reverse VPN Tunneling on a Device
    1 question

  • Preview23:29
  • DevOps Quiz
    3 questions

  • Red Teams
    06:23
  • Red Teaming Quiz
    3 questions

  • Red Team Operations
    02:46

  • Scenarios Introduction
    01:08

  • Classic Exploitation
    07:46
  • Classic Post-Exploitation
    14:31
  • Configuring a Basic C2
    1 question

  • The Dropbox
    10:45
  • The Dropbox Post-Exploitation
    20:50
  • Configuring PwnDrop
    08:05
  • Using Merlin with PwnDrop
    12:49
  • The Dropbox Assignment
    2 questions

Instructor

Casey Erdmann
Security Consultant
Casey Erdmann
  • 4.2 Instructor Rating
  • 283 Reviews
  • 15,483 Students
  • 1 Course

Security Consultant with over 6 years in IT ranging from Software Development, Security Analysis (DFIR), Management, all the way to Offensive Security Engineering/Penetration Testing.


Casey has been hacking into systems across the Payments and Health Care Industries for around 4 years since his switch into offensive security and continues that journey everyday.

Casey serves as the co-founder of DC706, volunteer staff on the Pros Versus Joes Red Cell, and is a bug hunter with the SRT. Casey was a speaker at DEF CON 27's first ever Red Team Village with his research titled "BadSalt (Adversarial DevOps)". Casey is passionate about hacking, and is constantly contributing to the larger InfoSec community.


Professional Certifications: OSCP, eJPT, LRPA, EU GDPR Foundations

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.