We recommend that all delegates are familiar with the principles of TCP/IP networking and have a working knowledge of Windows operating systems. It is essential that delegates have a good practical ‘hands-on’ experience of the Linux command line and Linux utilities. We recommend our Understanding Linux (Linux Primer) QALXPR-1 course.
This course teaches the attendees a wealth of hacking techniques to compromise the security of various operating systems and networking devices. The course starts from the very basic and gradually builds up to the level where attendees can not only use the tools and techniques to hack various components involved in infrastructure hacking, but also walk away with a solid understanding of the concepts on which these tools work. The course comprises of 3 days of infrastructure hacking, taken from the Blackhat course 'The Art of Hacking'.
System Administrators, IT Admins, SOC analysts, Penetration testers, network engineers, security enthusiasts and anyone who wants to take their skills to next level.
There are no pre-requisites. However, we recommend that all delegates are familiar with the principles of TCP/IP networking and have a working knowledge of the Windows and Linux command line utilities.
This course familiarises the attendees with a wealth of tools and techniques needed to breach the security of web applications and infrastructures. The course starts from the very basic and gradually build up to the level where attendees can not only use the tools and techniques to hack various components involved in infrstructure platforms, but also walk away with a solid understanding of the concepts on which these tools work. The course contains numerous real life examples to help the attendees understand the true impact of these vulnerabilities. This course is constantly updated on a regular basis to ensure that the latest exploits and vulnerabilities are available within the hacklab and taught in this course.
During the class, we will give you VPN access to our state-of-art hacklab which is hosted in our data centre in UK. Once you are connected to the lab, you will find all the relevant tools/VMs there. We also provide a dedicated Kali VM to each attendee on the hacklab.
- TCP/IP Basics
- The Art of Port scanning
- Target Enumeration
- Metasploit Basics
- Password Cracking
- Hacking Recent Unix Vulnerabilities
- Hacking Databases
- Hacking Application Servers
- Hacking third party applications (Wordpress, Joomla, Drupal)
- Windows Enumeration
- Hacking recent Windows Vulnerabilities.
- Hacking Third party software (Browser, PDF, Java)
- Post Exploitation: Dumping Secrets
- Hacking Windows Domains