PROACTIVERISK
  • About
    • Mission | People
    • 800 lb Gorilla
    • Careers
    • Books & Tools
    • Blog
    • Videos
    • Press & Events
    • Referral Program
    • Capabilities Statement
  • Industry
    • Legal and Accounting Firms:
    • Government
    • Financial Technology
    • Healthcare
  • 🔍 MeasureRISK
    • Industrial Controls
    • Threat Modeling
    • Table Top Exercises
    • AI Risk Services
    • Framework Audit
    • Supply Chain
  • 🛠️ ManageIT
    • Tech Leadership
    • Policy & Procedures
    • Security Awareness Training
    • Physical Security
    • Custom Software
    • Domains | DNS
    • InboxSafe
    • Workforce Analytics
    • Traffic FIlter
    • IT Service Management
    • Managed Detection and Response (MDR)
    • Data Protection Solutions
  • 🧠 CATScan
    • 🔴 🔵 🟣 🟢 🟡 Teams
    • Adversarial Operations Methodology
    • OSINT Investigations
    • Define Your Test Scenario

HANDS ON TRAINING

🔐 Live Offensive Security Training: Hands-On Workshop

Date: November 6th, 2025, Livingston, New Jersey 07039
Trainer: Logan Klein, Consultant Proactive Risk
REGISTER NOW - SPACE IS LIMITED
Join us for an immersive 8-hour live training experience, split into two dynamic 4-hour sessions. This instructor-led workshop blends short expert explanations, live demonstrations, and guided labs with real-time problem solving and unassisted mini-challenges—designed to build practical offensive security skills from the ground up.
​
Who Should Attend
  • New hires in cybersecurity roles
  • Junior analysts and developers
  • IT staff seeking a strong security foundation
Prerequisites: Basic comfort with command-line tools and web browsing.
🧠 What You’ll LearnThis workshop delivers a full-spectrum introduction to offensive security tactics across infrastructure, applications, and identity systems:
​
✅ Core Skills You’ll Build
  • Enumeration & Recon: Map out services, applications, and network infrastructure.
  • Manual Exploitation: Identify and exploit vulnerabilities in web apps, services, and OS platforms.
  • Initial Access: Use password attacks, misconfigurations, and web flaws to gain entry.
  • Privilege Escalation: Elevate access on Linux and Windows via local enumeration and exploits.
  • Shell Access: Establish reverse and bind shells to maintain control.
  • Active Directory Attacks: Execute Kerberoasting, AS-REP roasting, and pass-the-hash techniques.
  • Defense Evasion: Bypass antivirus, firewalls, and application whitelisting.
  • Client-Side Exploits: Launch phishing, malicious document, and browser-based attacks.
  • Lateral Movement: Use harvested credentials and misconfigurations to pivot across networks.
  • Learning Optimization: Apply dual-coding and rapid recall techniques to accelerate retention.

Overview
​
Total Duration: 8 hours (split into two 4-hour “mini-courses”)
Format: Short instructor-led explanations followed by live demonstrations, guided labs, and an unassisted mini-activity along with a review of this activity.
Audience: New hires, junior analysts, developers, or IT staff who need a practical security foundation.
Prerequisites: Comfort with basic command-line usage and web browsing.

🧰 Hands-On EnvironmentTo participate fully, you’ll need:
  • A laptop running Kali Linux
  • Docker installed on Kali
  • Active internet connection
  • A notepad and pencil (highly recommended for dual-coding)
🎯 Workshop Outcomes
  • Conceptual: Understand the offensive workflow and map it to defensive controls.
  • Technical: Capture packets, run scans, exploit SQL injection, and practice remediation.
  • Mindset: Learn to think like both attacker and defender—every exploit is paired with a mitigation strategy.


REGISTER NOW - SAVE YOUR SPOT
Contact Us
PROACTIVERISK
290 W Mt. Pleasant Ave, Suite 11309
Livingston, NJ 07039

☎️ 973-298-1160 | GPS Map
Picture
Client Portal
ManageIT Remote

​© COPYRIGHT 2025. ALL RIGHTS RESERVED.
  • About
    • Mission | People
    • 800 lb Gorilla
    • Careers
    • Books & Tools
    • Blog
    • Videos
    • Press & Events
    • Referral Program
    • Capabilities Statement
  • Industry
    • Legal and Accounting Firms:
    • Government
    • Financial Technology
    • Healthcare
  • 🔍 MeasureRISK
    • Industrial Controls
    • Threat Modeling
    • Table Top Exercises
    • AI Risk Services
    • Framework Audit
    • Supply Chain
  • 🛠️ ManageIT
    • Tech Leadership
    • Policy & Procedures
    • Security Awareness Training
    • Physical Security
    • Custom Software
    • Domains | DNS
    • InboxSafe
    • Workforce Analytics
    • Traffic FIlter
    • IT Service Management
    • Managed Detection and Response (MDR)
    • Data Protection Solutions
  • 🧠 CATScan
    • 🔴 🔵 🟣 🟢 🟡 Teams
    • Adversarial Operations Methodology
    • OSINT Investigations
    • Define Your Test Scenario