Talk With an Expert

SEC535: Offensive AI - Attack Tools and Techniques

SEC535Offensive Operations
  • 3 Days (Instructor-Led)
  • 18 Hours (Self-Paced)
Course created by:
Foster Nethercott
Foster Nethercott
SEC535: Offensive AI - Attack Tools and Techniques
Course created by:
Foster Nethercott
Foster Nethercott
  • 18 CPEs

    Apply your credits to renew your certifications

  • Virtual Live Instruction or Self-Paced

    Train from anywhere. Attend a live instructor-led course remotely or train on your time over 4 months.

  • 14 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Leverage cutting-edge AI tools and techniques to enhance offensive operations, automate attacks, and advance your penetration testing capabilities.

Course Overview

Attackers are already using AI to push past traditional defenses. They automate reconnaissance, craft convincing social engineering campaigns, and even generate custom malware designed to bypass security controls. This course is built for security professionals who need to understand how offensive teams apply AI at every stage of an attack. Over three days, you’ll examine the same tools and techniques adversaries use to map networks, manipulate human targets, and build evasive payloads. Through labs based on real-world scenarios, you’ll see firsthand how these tactics unfold and learn to anticipate them. By studying offensive AI through the eyes of the attacker, you will build the insight and hands-on experience needed to outpace these evolving threats and protect what matters most when it counts

What You'll Learn

  • Engineer AI-Powered Pentesting GPTs
  • Perform Patch Diffing with AI-Driven Analysis
  • Supercharge OSINT analysis with AI Automation
  • Weaponize AI for Social Engineering Attacks
  • Craft Custom AI Generated Malware
  • Design AI Optimized Exploits

Business Takeaways

  • Reduce organizational risk from AI-enabled cyber threats
  • Improve detection capabilities against novel attack vectors
  • Enhance security team readiness for emerging AI threats
  • Protect critical assets from advanced persistent threats
  • Strengthen compliance posture for AI security controls
  • Create robust security architecture resistant to AI attacks
  • Decrease incident response time for AI-powered attacks

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in SEC535: Offensive AI - Attack Tools and Techniques.

Section 1Introduction to Offensive AI and Vulnerability Exploitation

Discover how threat actors leverage AI to gather intelligence and exploit vulnerabilities. Students explore advanced OSINT tools enhanced by machine learning, examine RAG-powered penetration testing workflows, and exploit vulnerabilities using AI.

Topics covered

  • Introduction to Artificial Intelligence
  • Introduction to AI Models and Capabilities
  • OSINT AI For Penetration Testers
  • Network Reconnaissance and Vulnerability Exploitation
  • Web Exploitation Using AI

Labs

  • AI-Powered Reconnaissance
  • Automated Nmap Output Analysis Using N8N and RAG
  • Metasploit Reengineered
  • AInjection: Using AI for SQL Exploits
  • AI Assisted Brute Force and Command Injection

Section 2AI-Driven Vulnerability Exploitation

One of the biggest ways that AI is revolutionizing penetration testing is in the realm of social engineering. In recent years, we have seen an explosion of deep fake content, as well as the sophistication of phishing campaigns.

Topics covered

  • Introduction to Social Engineering
  • Creating AI-Powered Phishing Emails
  • Creating Audio Deepfakes
  • Creating Image and Video Deepfakes
  • Patch Diffing

Labs

  • Building PhishGPT
  • Lure Lab: Phishing Mini-Range
  • ElevenLabs Voice Cloning
  • AI Dialed Deception: Vishing Mini-Range
  • AI-Assisted Vulnerability Discovery and Patch Analysis

Section 3Vulnerability Discovery, Automation Attacks, and Malware Development

Explore cutting-edge AI applications in malware engineering and defense evasion. Students learn how neural networks transform malware development, grasp how attackers circumvent AI safety guardrails, demonstrate sophisticated evasion techniques powered by machine learning, and examine living-off-the-land tactics enhanced through computational intelligence.

Topics covered

  • Fundamentals of Malware
  • Writing Malware with AI
  • Hiding, Obscuring, and Trojanizing Persistent Malware
  • Agentic Malware
  • Bypassing Security Controls

Labs

  • Introduction to Writing Malware with AI
  • Advanced Malware Writing
  • Bypassing Security Controls with AI

Things You Need To Know

Course Schedule & Pricing

Looking for Group Purchasing Options?Contact Us
Filter by:
  • Location & instructor

    Virtual (OnDemand)

    Instructed by Foster Nethercott
    Date & Time
    OnDemand (Anytime)Self-Paced, 4 months access
    Course price
    $5,250 USD*Prices exclude applicable local taxesBuy now for access on Sep 22. Use code Presale10 for 10% off course price!
    Registration Options
  • Location & instructor

    Virtual (live)

    Instructed by Foster Nethercott
    Date & Time
    Fetching schedule..View event details
    Course price
    $5,250 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Virtual (live)

    Instructed by Foster Nethercott
    Date & Time
    Fetching schedule..View event details
    Course price
    $5,250 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Virtual (live)

    Instructed by Foster Nethercott
    Date & Time
    Fetching schedule..View event details
    Course price
    €4,935 EUR*Prices exclude applicable local taxes
    Registration Options
Showing 4 of 4

Benefits of Learning with SANS

Instructor teaching to a class

Get feedback from the world’s best cybersecurity experts and instructors

OnDemand Mobile App

Choose how you want to learn - online, on demand, or at our live in-person training events

Resources

Get access to our range of industry-leading courses and resources