Basic Infrastructure Hacking

This is a 3-day entry-level infrastructure hacking training course.

This is our entry-level infrastructure security testing course and also a recommended pre-requisite course before enrolling for our “Advanced Infrastructure Hacking” course. This foundation course familiarises the attendees with the basics of network hacking. A number of tools and techniques, backed up by a systematic approach on the various phases of hacking will be discussed during this course. If you would like to step into a career of Ethical Hacking / Pen Testing with the right amount of knowledge, this is the right course for you.

This course introduces the attendees with a wealth of hacking tools and techniques crucial in getting started in this dynamic field of hacking. The course begins with laying a foundation for everyone by discussing the basic concepts and gradually builds up to the level where attendees not only use the tools and techniques to hack various components involved in infrastructure hacking, but also walk away with a solid understanding of the concepts on how these tools work and therefore ready to face the real world.

Get certified:

This course introduces the attendees with a wealth of hacking tools and techniques crucial in getting started in this dynamic field of hacking. The course begins with laying a foundation for everyone by discussing the basic concepts and gradually builds up to the level where attendees not only use the tools and techniques to hack various components involved in infrastructure hacking, but also walk away with a solid understanding of the concepts on how these tools work and therefore ready to face the real world.

2021 Edition

3 day practical class

Available by Partners

Live, online available

Hack-Lab for 30 days

Basic

Course Overview

This is our entry-level infrastructure foundation course. A number of tools and techniques, backed up by a systematic approach on the various phases of hacking will be discussed during so if you would like to step into a career of Ethical Hacking / Pen Testing with the right amount of knowledge, then this is a great step forward.

Course Details

You will be able to:

  • Obtain a foothold in infrastructure testing
  • Gain practical experience with the tools that will last you well into the future
  • Learn core infrastructure techniques
  • Leave with the basics so you can take your testing knowledge forward into our more Advanced Infrastructure topics

You will receive:

Access to part of our Hack-Lab, our online course environment. This gives you plenty of time to practice the concepts taught during the course. There are challenges, examples and demos to get to grips with, and all the support you need.

What you can take away from the course:

This course introduces you to a wealth of hacking tools and techniques crucial in getting started in this dynamic field of hacking. The course begins with laying a foundation and discussing the basic concepts, gradually building up to the level where you not only use the tools and techniques to hack various components involved in infrastructure hacking, but also walk away with a solid understanding of the concepts on how these tools work and therefore ready to face the real world.

Details of the course content:

THE ART OF PORT SCANNING

  • Basic concepts of Hacking Methodology
  • Enumeration techniques and Port scanning

THE ART OF ONLINE PASSWORD ATTACKS

  • Configure online password attack
  • Exploiting network service misconfiguration

THE ART OF HACKING DATABASE

  • Mysql, Postgres
  • Attack chaining techniques

METASPLOIT BASICS

  • Exploitation concepts, Manual exploitation methodology
  • Metasploit framework

PASSWORD CRACKING

  • Understanding basic concepts of cryptography
  • Design offline brute force attack

HACKING UNIX

  • Linux vulnerabilities, misconfigurations
  • Privilege escalation techniques

HACKING APPLICATION SERVERS ON UNIX

  • Web server misconfiguration
  • Multiple exploitation techniques

HACKING THIRD PARTY CMS SOFTWARE

  • CMS Software
  • Vulnerability scanning & Exploitation

WINDOWS ENUMERATION

  • Windows Enumeration techniques & Configuration Issues
  • Attack chaining

CLIENT-SIDE ATTACKS

  • Various Windows client-side attack techniques

PRIVILEGE ESCALATION ON WINDOWS

  • Post exploitation
  • Windows Privilege escalation techniques

HACKING APPLICATION SERVERS ON WINDOWS

  • Web server misconfiguration
  • Exploiting Application servers

POST EXPLOITATION

  • Metasploit Post exploitation techniques
  • Window 10 Security features & different bypass techniques

HACKING WINDOWS DOMAINS

  • Understanding Windows Authentication
  • Gaining access to Domain Controller

Prerequisites

Who Should Take This Class?

  • Security enthusiasts
  • Anybody who wishes to make a career in this domain and gain knowledge of networks and applications
  • System Administrators
  • SOC Analysts
  • Network Engineers
  • Pen Testers who are wanting to level up their skills

You will need:

The only requirement for this course is that you bring your laptop with an admin/root access. VPN access to our state-of-the-art hacklab, which is hosted in our data centre in the UK where required tools/virtual machines (VMs) will be found, will be provided during the course. We also provide a dedicated Kali VM to each attendee on the hacklab, so you don’t need to bring any VMs with you, all you need is to install the VPN client and you are good to go!

How to book

This course is available directly from Claranet Cyber Security, please use the form alongside.

The course is also available from our partners listed below

QA training

Checkpoint training

Courses and webinars

Basic Infrastructure Hacking

Course Information

You can download a copy of the course information below.

In addition you will also be provided with a student pack, handouts and cheat-sheets if appropriate.

Download the course information

Your Training Roadmap

Offensive Classes

Hacking training for all levels: new to advanced. Ideal for those preparing for certifications such as CREST CCT (ICE), CREST CCT (ACE), CHECK (CTL), TIGER SST as well as infrastructure / web application penetration testers wishing to add to their existing skill set.

Defensive Classes

Giving you the skills needed to get ahead and secure your business by design. We specialise in application security (both secure coding and building security testing into your software development lifecycle) and cloud security. Build security capability into your teams enabling you to move fast and stay secure.

Testimonials

Very impressed with the lab environment. Course is packed with Information and exciting challenges. Excellent Content and in-depth presentation. Loved the practice timing and walk-through. The extended lab access is helpful to practice after the class."

Delegate, Black Hat USA

Just completed an excellent course. Please pass on my thanks and regards to the teacher, he did an excellent job."

Delegate, Black Hat USA

It was really, very good."

Delegate, Basic Infrastructure Hacking

I've had a great training experience and learned very cool infrastructure hacking techniques"

Delegate, Basic Infrastructure Hacking

It provided me with the latest Information Security research & development"

Delegate, Black Hat USA