🔐 Live Offensive Security Training: Hands-On Workshop
Date: November 6th, 2025, Livingston, New Jersey 07039
Trainer: Logan Klein, Consultant Proactive Risk
Trainer: Logan Klein, Consultant Proactive Risk
Join us for an immersive 8-hour live training experience, split into two dynamic 4-hour sessions. This instructor-led workshop blends short expert explanations, live demonstrations, and guided labs with real-time problem solving and unassisted mini-challenges—designed to build practical offensive security skills from the ground up.
Who Should Attend
Who Should Attend
- New hires in cybersecurity roles
- Junior analysts and developers
- IT staff seeking a strong security foundation
🧠 What You’ll LearnThis workshop delivers a full-spectrum introduction to offensive security tactics across infrastructure, applications, and identity systems:
✅ Core Skills You’ll Build
Overview
Total Duration: 8 hours (split into two 4-hour “mini-courses”)
Format: Short instructor-led explanations followed by live demonstrations, guided labs, and an unassisted mini-activity along with a review of this activity.
Audience: New hires, junior analysts, developers, or IT staff who need a practical security foundation.
Prerequisites: Comfort with basic command-line usage and web browsing.
🧰 Hands-On EnvironmentTo participate fully, you’ll need:
✅ Core Skills You’ll Build
- Enumeration & Recon: Map out services, applications, and network infrastructure.
- Manual Exploitation: Identify and exploit vulnerabilities in web apps, services, and OS platforms.
- Initial Access: Use password attacks, misconfigurations, and web flaws to gain entry.
- Privilege Escalation: Elevate access on Linux and Windows via local enumeration and exploits.
- Shell Access: Establish reverse and bind shells to maintain control.
- Active Directory Attacks: Execute Kerberoasting, AS-REP roasting, and pass-the-hash techniques.
- Defense Evasion: Bypass antivirus, firewalls, and application whitelisting.
- Client-Side Exploits: Launch phishing, malicious document, and browser-based attacks.
- Lateral Movement: Use harvested credentials and misconfigurations to pivot across networks.
- Learning Optimization: Apply dual-coding and rapid recall techniques to accelerate retention.
Overview
Total Duration: 8 hours (split into two 4-hour “mini-courses”)
Format: Short instructor-led explanations followed by live demonstrations, guided labs, and an unassisted mini-activity along with a review of this activity.
Audience: New hires, junior analysts, developers, or IT staff who need a practical security foundation.
Prerequisites: Comfort with basic command-line usage and web browsing.
🧰 Hands-On EnvironmentTo participate fully, you’ll need:
- A laptop running Kali Linux
- Docker installed on Kali
- Active internet connection
- A notepad and pencil (highly recommended for dual-coding)
- Conceptual: Understand the offensive workflow and map it to defensive controls.
- Technical: Capture packets, run scans, exploit SQL injection, and practice remediation.
- Mindset: Learn to think like both attacker and defender—every exploit is paired with a mitigation strategy.