Infrastructure Hacking

3 Day Course
Hands On
Code QAIHACK

Book Now - 1 Delivery Method Available:

Classroom Virtual Classroom Private Group - Virtual Self-Paced Online

Overview

This course teaches the attendees a wealth of hacking techniques to compromise the security of various operating systems and networking devices. The course starts from the very basic and gradually builds up to the level where attendees can not only use the tools and techniques to hack various components involved in infrastructure hacking, but also walk away with a solid understanding of the concepts on which these tools work. The course comprises of 3 days of infrastructure hacking, taken from the Blackhat course 'The Art of Hacking'.

Objectives

This course familiarises the attendees with a wealth of tools and techniques needed to breach the security of web applications and infrastructures. The course starts from the very basic and gradually build up to the level where attendees can not only use the tools and techniques to hack various components involved in infrstructure platforms, but also walk away with a solid understanding of the concepts on which these tools work. The course contains numerous real life examples to help the attendees understand the true impact of these vulnerabilities. This course is constantly updated on a regular basis to ensure that the latest exploits and vulnerabilities are available within the hacklab and taught in this course.

During the class, we will give you VPN access to our state-of-art hacklab which is hosted in our data centre in UK. Once you are connected to the lab, you will find all the relevant tools/VMs there. We also provide a dedicated Kali VM to each attendee on the hacklab.

Target Audience

System Administrators, IT Admins, SOC analysts, Penetration testers, network engineers, security enthusiasts and anyone who wants to take their skills to next level.

Training Partners

We work with the following best of breed training partners using our bulk buying power to bring you a wider range of dates, locations and prices.

Modules

Collapse all

Day 1 (6 topics)

  • CP/IP Basics
  • The Art of Port scanning
  • Target Enumeration
  • Brute-forcing
  • Metasploit Basics
  • Password Cracking

Day 2 (4 topics)

  • Hacking Recent Unix Vulnerabilities
  • Hacking Databases
  • Hacking Application Servers
  • Hacking third party applications (Wordpress, Joomla, Drupal)

Day 3 (5 topics)

  • Windows Enumeration
  • Hacking recent Windows Vulnerabilities.
  • Hacking Third party software (Browser, PDF, Java)
  • Post Exploitation: Dumping Secrets
  • Hacking Windows Domains

Prerequisites

There are no pre-requisites. However, we recommend that all delegates are familiar with the principles of TCP/IP networking and have a working knowledge of the Windows and Linux command line utilities.

Scheduled Dates

Please select from the dates below to make an enquiry or booking.

Pricing

Different pricing structures are available including special offers. These include early bird, late availability, multi-place, corporate volume and self-funding rates. Please arrange a discussion with a training advisor to discover your most cost effective option.

Code Location Duration Price May Jun Jul Aug Sep Oct
Later scheduled dates may be available for this course.

Course PDF

Print

Share this Course

Share

Recommend this Course

Sections