Chris Bingham

Founder, BSides Triad

Chris Bingham is an autodidact, life-long learner, ethical hacker and founder of two cyber security organizations: InfoSec GSO and BSides Triad. Along with his colleagues, he leads hands-on offensive security style workshops and training. His experience and skills range from Linux, Windows and Mac operating systems to buffer overflow development, Burp Suite, and hacking Windows Domain Controller and Active Directory. Chris hopes you enjoy taking his courses as much as he enjoyed making them.

Content from Chris Bingham

Offensive Bash Scripting
Learning Path
Offensive Bash Scripting

Offensive Bash Scripting

The Offensive Bash Scripting Learning Path is aimed at beginners and helps you learn one of the many fundamental skills of ethical hacking.

Python for Pentesters
Learning Path
Python for Pentesters

Python for Pentesters

This path is an in-depth look at Python for penetration testers. It begins with a Python refresher, before we move on to network penetration testing, Python hacking tools and using Python to attack web applications.

Concise History of Linux
Course
Concise History of Linux

Concise History of Linux

This course is an introduction to offensive Bash scripting and the history of Linux and the Bourne Again shell.

Creating the Lab
Course
Creating the Lab

Creating the Lab

In course two, we will learn about VirtualBox and its role as a hypervisor.

Introduction to Linux, Bash and Python with Basics of the Bourne Again Shell
Course
Introduction to Linux, Bash and Python with Basics of the Bourne Again Shell

Introduction to Linux, Bash and Python with Basics of the Bourne Again Shell

This course is your introduction to Linux, Bash and Python and the basics of the Bourne Again shell.

User and Group Management
Course
User and Group Management

User and Group Management

This course is your introduction to user and group management.

File Permission and Process
Course
File Permission and Process

File Permission and Process

In this course, we will cover file permissions and processes.

Network Reconnaissance
Course
Network Reconnaissance

Network Reconnaissance

In this course, we will cover how to write Bash scripts to conduct network reconnaissance.

Scripting to Scan Web Applications
Course
Scripting to Scan Web Applications

Scripting to Scan Web Applications

In this course, you'll use the tools you created to discover vulnerabilities.

Privilege Escalation
Course
Privilege Escalation

Privilege Escalation

Course eight is an in-depth look at the process of privilege escalation.

Refresher on Python
Course
Refresher on Python

Refresher on Python

An introduction to the course and some refreshers on Python.

Common Vulnerabilities Exploitable by Python
Course
Common Vulnerabilities Exploitable by Python

Common Vulnerabilities Exploitable by Python

This course explores common vulnerabilities and vulnerability exploitation in Python.

Using Python for Network Penetration
Course
Using Python for Network Penetration

Using Python for Network Penetration

In this course, we will explore the uses of Python in penetration testing and attacking.

Attacking Web Applications
Course
Attacking Web Applications

Attacking Web Applications

In this course, you'll explore the ins and outs of attacking web applications with Python.

Exceptional learning experiences powered by LX Labs cyber expertise

Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Cybersecurity Workforce Framework.