This is a 3-day entry-level infrastructure hacking training course.
This is our entry-level infrastructure security testing course and also a recommended pre-requisite course before enrolling for our “Advanced Infrastructure Hacking” course. This foundation course familiarises the attendees with the basics of network hacking. A number of tools and techniques, backed up by a systematic approach on the various phases of hacking will be discussed during this course. If you would like to step into a career of Ethical Hacking / Pen Testing with the right amount of knowledge, this is the right course for you.
This course introduces the attendees with a wealth of hacking tools and techniques crucial in getting started in this dynamic field of hacking. The course begins with laying a foundation for everyone by discussing the basic concepts and gradually builds up to the level where attendees not only use the tools and techniques to hack various components involved in infrastructure hacking, but also walk away with a solid understanding of the concepts on how these tools work and therefore ready to face the real world.
Get certified:
Once you have completed the course, you can take an optional exam with Check Point whenever it suits you, and become a Check Point Certified Pen Testing Expert (CCPE).
2023 Edition
3 day practical class
Available by Partners
Live, online available
Hack-Lab for 30 days
Basic
Course Overview
This is our entry-level infrastructure foundation course. A number of tools and techniques, backed up by a
systematic approach on the various phases of hacking will be discussed during so if you would like to step
into a career of Ethical Hacking / Pen Testing with the right amount of knowledge, then this is a great step
forward.
See what our training roadmap
covers.
Upcoming courses
Enquire about your training
We provide training directly (live, online or in person) and also work with a range of training partners in different locations around the globe for classroom or live, online training. Please contact us with details of your requirement and we will recommend the best route to access our amazing training.
The course can also be booked directly through our accredited training partners.
If booked through Check Point, Cyber-Security Learning Credits are accepted for this course.
For security and IT decision makers
What’s the real impact of training your team through NotSoSecure?
Start to build the skills and confidence within your team to harden your infrastructure and make your
organisation a less attractive target for attackers. Trained delegates can:
- Use industry-standard tools, like Nmap, Hydra, and Metasploit, to perform penetration testing against your
infrastructure. - Find and exploit vulnerabilities in your infrastructure, including those that would lead to initial
exploitation, attack chaining, privilege escalation, persistence, and more. - Identify and recommend remediations for common misconfigurations.
- Understand and explain infrastructure-based hacking methodology for both Windows and Linux and tie this to
attacks across the kill chain. - Adapt their approach for different operating systems.
- Relate security testing and other offensive and defensive measures back to authentic attack vectors.
Course Details
You will be able to:
- Obtain a foothold in infrastructure testing
- Gain practical experience with the tools that will last you well into the future
- Learn core infrastructure techniques
- Leave with the basics so you can take your testing knowledge forward into our more Advanced
Infrastructure topics
You will receive:
Access to part of our Hack-Lab, our online course environment. This gives you plenty of time to practice the
concepts taught during the course. There are challenges, examples and demos to get to grips with, and all the
support you need.
What you can take away from the course:
This course introduces you to a wealth of hacking tools and techniques crucial in getting started in this dynamic
field of hacking. The course begins with laying a foundation and discussing the basic concepts, gradually building
up to the level where you not only use the tools and techniques to hack various components involved in
infrastructure hacking, but also walk away with a solid understanding of the concepts on how these tools work and
therefore ready to face the real world.
Details of the course content:
THE ART OF PORT SCANNING
- Basic concepts of Hacking Methodology
- Enumeration techniques and Port scanning
THE ART OF ONLINE PASSWORD ATTACKS
- Configure online password attack
- Exploiting network service misconfiguration
THE ART OF HACKING DATABASES
- Mysql, Postgres
- Attack chaining techniques
METASPLOIT BASICS
- Exploitation concepts, Manual exploitation methodology
- Metasploit framework
PASSWORD CRACKING
- Understanding basic concepts of cryptography
- Design offline brute force attack
HACKING UNIX
- Linux vulnerabilities, misconfigurations
- Privilege escalation techniques
HACKING APPLICATION SERVERS ON UNIX
- Web server misconfiguration
- Multiple exploitation techniques
HACKING THIRD PARTY CMS SOFTWARE
- CMS Software
- Vulnerability scanning & Exploitation
WINDOWS ENUMERATION
- Windows Enumeration techniques & Configuration Issues
- Attack chaining
CLIENT-SIDE ATTACKS
- Various Windows client-side attack techniques
PRIVILEGE ESCALATION ON WINDOWS
- Post exploitation
- Windows Privilege escalation techniques
HACKING APPLICATION SERVERS ON WINDOWS
- Web server misconfiguration
- Exploiting Application servers
POST EXPLOITATION
- Metasploit Post exploitation techniques
- Window 10 Security features & different bypass techniques
HACKING WINDOWS DOMAINS
- Understanding Windows Authentication
- Gaining access to Domain Controller
Prerequisites
Who Should Take This Class?
- Security enthusiasts
- Anybody who wishes to make a career in this domain and gain knowledge of networks and
applications - System Administrators
- SOC Analysts
- Network Engineers
- Pen Testers who are wanting to level up their skills
You will need:
The only requirement for this course is that you bring your laptop with an admin/root access. VPN access to our
state-of-the-art hacklab, which is hosted in our data centre in the UK where required tools/virtual machines (VMs)
will be found, will be provided during the course. We also provide a dedicated Kali VM to each attendee on the
hacklab, so you don’t need to bring any VMs with you, all you need is to install the VPN client and you are good
to go!
Course Information
You can download a copy of the course information below.
In addition you will also be provided with a student pack, handouts and cheat-sheets if appropriate.
Your Training Roadmap
Offensive Classes
Hacking training for all levels: new to advanced. Ideal for those preparing for certifications such as CREST
CCT (ICE), CREST CCT (ACE), CHECK (CTL), TIGER SST as well as infrastructure / web application penetration
testers wishing to add to their existing skill set.
Defensive Classes
Giving you the skills needed to get ahead and secure your business by design. We specialise in application
security (both secure coding and building security testing into your software development lifecycle) and cloud
security. Build security capability into your teams enabling you to move fast and stay secure.
Testimonials
Very impressed with the lab environment. Course is packed with Information and exciting challenges.
Excellent Content and in-depth presentation. Loved the practice timing and walk-through. The extended lab
access is helpful to practice after the class."Delegate, Black Hat USA
Just completed an excellent course. Please pass on my thanks and regards to the teacher, he did an
excellent job."Delegate, Black Hat USA
It was really, very good."
Delegate, Basic Infrastructure Hacking
I've had a great training experience and learned very cool infrastructure hacking techniques"
Delegate, Basic Infrastructure Hacking
It provided me with the latest Information Security research & development"
Delegate, Black Hat USA