This is a 3-day entry-level infrastructure hacking training course.
This is our entry-level infrastructure security testing course and also a recommended pre-requisite course before enrolling for our “Advanced Infrastructure Hacking” course. This foundation course familiarises the attendees with the basics of network hacking. A number of tools and techniques, backed up by a systematic approach on the various phases of hacking will be discussed during this course. If you would like to step into a career of Ethical Hacking / Pen Testing with the right amount of knowledge, this is the right course for you.
This course introduces the attendees with a wealth of hacking tools and techniques crucial in getting started in this dynamic field of hacking. The course begins with laying a foundation for everyone by discussing the basic concepts and gradually builds up to the level where attendees not only use the tools and techniques to hack various components involved in infrastructure hacking, but also walk away with a solid understanding of the concepts on how these tools work and therefore ready to face the real world.
Get certified:
Once you have completed the course, you can take an optional exam with Check Point whenever it suits you, and become a Check Point Certified Pen Testing Expert (CCPE).
2024 Edition
3 day practical class
Available by Partners
Live, online available
Hack-Lab for 30 days
Basic
Course Overview
This is our entry-level infrastructure foundation course. A number of tools and techniques, backed up by a systematic approach on the various phases of hacking will be discussed during so if you would like to step into a career of Ethical Hacking / Pen Testing with the right amount of knowledge, then this is a great step forward.
Interested?
1. Our courses are available directly from us; through our training partners or at worldwide technical conferences.
2. You can find course dates and prices on the Courses and Webinars page.
3. Take a look below at a few of the upcoming courses for this specific training.
4. For more information including private course requests, complete the short form below.
Courses and webinars
Booking enquiries
Select the course from the Courses and Webinars Page.
Click here for course dates and prices
For private course delivery enquiries or other information, please use the form alongside.
The course is also available from our partners listed below.
If booked through Check Point, Cyber-Security Leraning Credits are accepted for this course.
For security and IT decision makers
What’s the real impact of training your team through NotSoSecure?
Start to build the skills and confidence within your team to harden your infrastructure and make your organisation a less attractive target for attackers. Trained delegates can:
- Use industry-standard tools, like Nmap, Hydra, and Metasploit, to perform penetration testing against your infrastructure.
- Find and exploit vulnerabilities in your infrastructure, including those that would lead to initial exploitation, attack chaining, privilege escalation, persistence, and more.
- Identify and recommend remediations for common misconfigurations.
- Understand and explain infrastructure-based hacking methodology for both Windows and Linux and tie this to attacks across the kill chain.
- Adapt their approach for different operating systems.
- Relate security testing and other offensive and defensive measures back to authentic attack vectors.
Course Details
You will be able to:
- Obtain a foothold in infrastructure testing
- Gain practical experience with the tools that will last you well into the future
- Learn core infrastructure techniques
- Leave with the basics so you can take your testing knowledge forward into our more Advanced Infrastructure topics
You will receive:
Access to part of our Hack-Lab, our online course environment. This gives you plenty of time to practice the concepts taught during the course. There are challenges, examples and demos to get to grips with, and all the support you need.
What you can take away from the course:
This course introduces you to a wealth of hacking tools and techniques crucial in getting started in this dynamic field of hacking. The course begins with laying a foundation and discussing the basic concepts, gradually building up to the level where you not only use the tools and techniques to hack various components involved in infrastructure hacking, but also walk away with a solid understanding of the concepts on how these tools work and therefore ready to face the real world.
Details of the course content:
THE ART OF PORT SCANNING
- Basic concepts of Hacking Methodology
- Enumeration techniques and Port scanning
THE ART OF ONLINE PASSWORD ATTACKS
- Configure online password attack
- Exploiting network service misconfiguration
THE ART OF HACKING DATABASES
- Mysql, Postgres
- Attack chaining techniques
METASPLOIT BASICS
- Exploitation concepts, Manual exploitation methodology
- Metasploit framework
PASSWORD CRACKING
- Understanding basic concepts of cryptography
- Design offline brute force attack
HACKING UNIX
- Linux vulnerabilities, misconfigurations
- Privilege escalation techniques
HACKING APPLICATION SERVERS ON UNIX
- Web server misconfiguration
- Multiple exploitation techniques
HACKING THIRD PARTY CMS SOFTWARE
- CMS Software
- Vulnerability scanning & Exploitation
WINDOWS ENUMERATION
- Windows Enumeration techniques & Configuration Issues
- Attack chaining
CLIENT-SIDE ATTACKS
- Various Windows client-side attack techniques
PRIVILEGE ESCALATION ON WINDOWS
- Post exploitation
- Windows Privilege escalation techniques
HACKING APPLICATION SERVERS ON WINDOWS
- Web server misconfiguration
- Exploiting Application servers
POST EXPLOITATION
- Metasploit Post exploitation techniques
- Window 10 Security features & different bypass techniques
HACKING WINDOWS DOMAINS
- Understanding Windows Authentication
- Gaining access to Domain Controller
Prerequisites
Who Should Take This Class?
- Security enthusiasts
- Anybody who wishes to make a career in this domain and gain knowledge of networks and applications
- System Administrators
- SOC Analysts
- Network Engineers
- Pen Testers who are wanting to level up their skills
You will need:
The only requirement for this course is that you bring your laptop with an admin/root access. VPN access to our state-of-the-art hacklab, which is hosted in our data centre in the UK where required tools/virtual machines (VMs) will be found, will be provided during the course. We also provide a dedicated Kali VM to each attendee on the hacklab, so you don’t need to bring any VMs with you, all you need is to install the VPN client and you are good to go!
Course Information
You can download a copy of the course information below.
In addition you will also be provided with a student pack, handouts and cheat-sheets if appropriate.
Your Training Roadmap
Offensive Classes
Hacking training for all levels: new to advanced. Ideal for those preparing for certifications such as CREST CCT (ICE), CREST CCT (ACE), CHECK (CTL), TIGER SST as well as infrastructure / web application penetration testers wishing to add to their existing skill set.
Defensive Classes
Giving you the skills needed to get ahead and secure your business by design. We specialise in application security (both secure coding and building security testing into your software development lifecycle) and cloud security. Build security capability into your teams enabling you to move fast and stay secure.
Testimonials
Very impressed with the lab environment. Course is packed with Information and exciting challenges. Excellent Content and in-depth presentation. Loved the practice timing and walk-through. The extended lab access is helpful to practice after the class."
Delegate, Black Hat USA
Just completed an excellent course. Please pass on my thanks and regards to the teacher, he did an excellent job."
Delegate, Black Hat USA
It was really, very good."
Delegate, Basic Infrastructure Hacking
I've had a great training experience and learned very cool infrastructure hacking techniques"
Delegate, Basic Infrastructure Hacking
It provided me with the latest Information Security research & development"
Delegate, Black Hat USA