Basic Infrastructure Hacking

This is a 3-day entry-level infrastructure hacking training course.

This is our entry-level infrastructure security testing course and also a recommended pre-requisite course before enrolling for our “Advanced Infrastructure Hacking” course. This foundation course familiarises the attendees with the basics of network hacking. A number of tools and techniques, backed up by a systematic approach on the various phases of hacking will be discussed during this course. If you would like to step into a career of Ethical Hacking / Pen Testing with the right amount of knowledge, this is the right course for you.

This course introduces the attendees with a wealth of hacking tools and techniques crucial in getting started in this dynamic field of hacking. The course begins with laying a foundation for everyone by discussing the basic concepts and gradually builds up to the level where attendees not only use the tools and techniques to hack various components involved in infrastructure hacking, but also walk away with a solid understanding of the concepts on how these tools work and therefore ready to face the real world.

Get certified:

Once you have completed the course, you can take an optional exam with Check Point whenever it suits you, and become a Check Point Certified Pen Testing Expert (CCPE).

2023 Edition

3 day practical class

Available by Partners

Live, online available

Hack-Lab for 30 days

Basic

Course Overview

This is our entry-level infrastructure foundation course. A number of tools and techniques, backed up by a systematic approach on the various phases of hacking will be discussed during so if you would like to step into a career of Ethical Hacking / Pen Testing with the right amount of knowledge, then this is a great step forward.

See what our training roadmap covers.
Interested

Interested?

1. Our courses are available directly from us; through our training partners or at worldwide technical conferences.

2. You can find course dates and prices on the Courses and Webinars page. Click here for course dates, prices and content

3. Take a look below at a few of the upcoming courses for this specific training.

4. For more information including private course requests, complete the short form below.

Courses and webinars

Sorry, there are no specific public courses for this module in the immediate future. Please come back later as we are adding them all the time, view all our courses or check with one of our partners.

All upcoming courses

Booking enquiries

Select the course from the Courses and Webinars Page.

Click here for course dates and prices

For private course delivery enquiries or other information, please use the form alongside.

The course is also available from our partners listed below.

QA training

If booked through Check Point, Cyber-Security Leraning Credits are accepted for this course.

Checkpoint training

For security and IT decision makers

What’s the real impact of training your team through NotSoSecure?

Start to build the skills and confidence within your team to harden your infrastructure and make your organisation a less attractive target for attackers. Trained delegates can:

  • Use industry-standard tools, like Nmap, Hydra, and Metasploit, to perform penetration testing against your infrastructure.
  • Find and exploit vulnerabilities in your infrastructure, including those that would lead to initial exploitation, attack chaining, privilege escalation, persistence, and more.
  • Identify and recommend remediations for common misconfigurations.
  • Understand and explain infrastructure-based hacking methodology for both Windows and Linux and tie this to attacks across the kill chain.
  • Adapt their approach for different operating systems.
  • Relate security testing and other offensive and defensive measures back to authentic attack vectors.

Course Details

You will be able to:

  • Obtain a foothold in infrastructure testing
  • Gain practical experience with the tools that will last you well into the future
  • Learn core infrastructure techniques
  • Leave with the basics so you can take your testing knowledge forward into our more Advanced Infrastructure topics

You will receive:

Access to part of our Hack-Lab, our online course environment. This gives you plenty of time to practice the concepts taught during the course. There are challenges, examples and demos to get to grips with, and all the support you need.

What you can take away from the course:

This course introduces you to a wealth of hacking tools and techniques crucial in getting started in this dynamic field of hacking. The course begins with laying a foundation and discussing the basic concepts, gradually building up to the level where you not only use the tools and techniques to hack various components involved in infrastructure hacking, but also walk away with a solid understanding of the concepts on how these tools work and therefore ready to face the real world.

Details of the course content:

THE ART OF PORT SCANNING

  • Basic concepts of Hacking Methodology
  • Enumeration techniques and Port scanning

THE ART OF ONLINE PASSWORD ATTACKS

  • Configure online password attack
  • Exploiting network service misconfiguration

THE ART OF HACKING DATABASES

  • Mysql, Postgres
  • Attack chaining techniques

METASPLOIT BASICS

  • Exploitation concepts, Manual exploitation methodology
  • Metasploit framework

PASSWORD CRACKING

  • Understanding basic concepts of cryptography
  • Design offline brute force attack

HACKING UNIX

  • Linux vulnerabilities, misconfigurations
  • Privilege escalation techniques

HACKING APPLICATION SERVERS ON UNIX

  • Web server misconfiguration
  • Multiple exploitation techniques

HACKING THIRD PARTY CMS SOFTWARE

  • CMS Software
  • Vulnerability scanning & Exploitation

WINDOWS ENUMERATION

  • Windows Enumeration techniques & Configuration Issues
  • Attack chaining

CLIENT-SIDE ATTACKS

  • Various Windows client-side attack techniques

PRIVILEGE ESCALATION ON WINDOWS

  • Post exploitation
  • Windows Privilege escalation techniques

HACKING APPLICATION SERVERS ON WINDOWS

  • Web server misconfiguration
  • Exploiting Application servers

POST EXPLOITATION

  • Metasploit Post exploitation techniques
  • Window 10 Security features & different bypass techniques

HACKING WINDOWS DOMAINS

  • Understanding Windows Authentication
  • Gaining access to Domain Controller

Prerequisites

Who Should Take This Class?

  • Security enthusiasts
  • Anybody who wishes to make a career in this domain and gain knowledge of networks and applications
  • System Administrators
  • SOC Analysts
  • Network Engineers
  • Pen Testers who are wanting to level up their skills

You will need:

The only requirement for this course is that you bring your laptop with an admin/root access. VPN access to our state-of-the-art hacklab, which is hosted in our data centre in the UK where required tools/virtual machines (VMs) will be found, will be provided during the course. We also provide a dedicated Kali VM to each attendee on the hacklab, so you don’t need to bring any VMs with you, all you need is to install the VPN client and you are good to go!

Basic Infrastructure Hacking

Course Information

You can download a copy of the course information below.

In addition you will also be provided with a student pack, handouts and cheat-sheets if appropriate.

Download the course information

Your Training Roadmap

Offensive Classes

Hacking training for all levels: new to advanced. Ideal for those preparing for certifications such as CREST CCT (ICE), CREST CCT (ACE), CHECK (CTL), TIGER SST as well as infrastructure / web application penetration testers wishing to add to their existing skill set.

Defensive Classes

Giving you the skills needed to get ahead and secure your business by design. We specialise in application security (both secure coding and building security testing into your software development lifecycle) and cloud security. Build security capability into your teams enabling you to move fast and stay secure.

Testimonials

Very impressed with the lab environment. Course is packed with Information and exciting challenges. Excellent Content and in-depth presentation. Loved the practice timing and walk-through. The extended lab access is helpful to practice after the class."

Delegate, Black Hat USA

Just completed an excellent course. Please pass on my thanks and regards to the teacher, he did an excellent job."

Delegate, Black Hat USA

It was really, very good."

Delegate, Basic Infrastructure Hacking

I've had a great training experience and learned very cool infrastructure hacking techniques"

Delegate, Basic Infrastructure Hacking

It provided me with the latest Information Security research & development"

Delegate, Black Hat USA