Book Now - 2 Delivery Methods Available:Scheduled Virtual Onsite
This course teaches the attendees a wealth of hacking techniques to compromise the security of various operating systems and networking devices. The course starts from the very basic and gradually builds up to the level where attendees can not only use the tools and techniques to hack various components involved in infrastructure hacking, but also walk away with a solid understanding of the concepts on which these tools work. The course comprises of 3 days of infrastructure hacking, taken from the Blackhat course 'The Art of Hacking'.
This course familiarises the attendees with a wealth of tools and techniques needed to breach the security of web applications and infrastructures. The course starts from the very basic and gradually build up to the level where attendees can not only use the tools and techniques to hack various components involved in infrstructure platforms, but also walk away with a solid understanding of the concepts on which these tools work. The course contains numerous real life examples to help the attendees understand the true impact of these vulnerabilities. This course is constantly updated on a regular basis to ensure that the latest exploits and vulnerabilities are available within the hacklab and taught in this course.
During the class, we will give you VPN access to our state-of-art hacklab which is hosted in our data centre in UK. Once you are connected to the lab, you will find all the relevant tools/VMs there. We also provide a dedicated Kali VM to each attendee on the hacklab.
System Administrators, IT Admins, SOC analysts, Penetration testers, network engineers, security enthusiasts and anyone who wants to take their skills to next level.
We work with the following best of breed training partners using our bulk buying power to bring you a wider range of dates, locations and prices.
Day 1 (6 topics)
- CP/IP Basics
- The Art of Port scanning
- Target Enumeration
- Metasploit Basics
- Password Cracking
Day 2 (4 topics)
- Hacking Recent Unix Vulnerabilities
- Hacking Databases
- Hacking Application Servers
- Hacking third party applications (Wordpress, Joomla, Drupal)
Day 3 (5 topics)
- Windows Enumeration
- Hacking recent Windows Vulnerabilities.
- Hacking Third party software (Browser, PDF, Java)
- Post Exploitation: Dumping Secrets
- Hacking Windows Domains
There are no pre-requisites. However, we recommend that all delegates are familiar with the principles of TCP/IP networking and have a working knowledge of the Windows and Linux command line utilities.
Please select from the dates below to make an enquiry or booking.
Different pricing structures are available including special offers. These include early bird, late availability, multi-place, corporate volume and self-funding rates. Please arrange a discussion with a training advisor to discover your most cost effective option.