Course Summary

This is our entry-level infrastructure foundation course. A number of tools and techniques, backed up by a systematic approach on the various phases of hacking will be discussed during so if you would like to step into a career of Ethical Hacking / Pen Testing with the right amount of knowledge, then this is a great step forward.

Trained delegates can:

• Use industry-standard tools, like Nmap, Hydra, and Metasploit, to perform penetration testing against your infrastructure.
• Find and exploit vulnerabilities in your infrastructure, including those that would lead to initial exploitation, attack chaining, privilege escalation, persistence, and more.
• Identify and recommend remediations for common misconfigurations.
• Understand and explain infrastructure-based hacking methodology for both Windows and Linux and tie this to attacks across the kill chain.
• Adapt their approach for different operating systems.
• Relate security testing and other offensive and defensive measures back to authentic attack vectors.

THE ART OF PORT SCANNING
• Basic concepts of Hacking Methodology
• Enumeration techniques and Port scanning
THE ART OF ONLINE PASSWORD ATTACKS
• Configure online password attack
• Exploiting network service misconfiguration

THE ART OF HACKING DATABASES
• Mysql, Postgres
• Attack chaining techniques
METASPLOIT BASICS
• Exploitation concepts, Manual exploitation methodology
• Metasploit framework

PASSWORD CRACKING
• Understanding basic concepts of cryptography
• Design offline brute force attack
HACKING UNIX
• Linux vulnerabilities, misconfigurations
• Privilege escalation techniques

HACKING APPLICATION SERVERS ON UNIX
• Web server misconfiguration
• Multiple exploitation techniques

HACKING THIRD PARTY CMS SOFTWARE
• CMS Software
• Vulnerability scanning & Exploitation
WINDOWS ENUMERATION
• Windows Enumeration techniques & Configuration Issues
• Attack chaining

CLIENT-SIDE ATTACKS
• Various Windows client-side attack techniques

PRIVILEGE ESCALATION ON WINDOWS
• Post exploitation
• Windows Privilege escalation techniques

HACKING APPLICATION SERVERS ON WINDOWS
• Web server misconfiguration
• Exploiting Application servers

POST EXPLOITATION
• Metasploit Post exploitation techniques
• Window 10 Security features & different bypass techniques

HACKING WINDOWS DOMAINS
• Understanding Windows Authentication
• Gaining access to Domain Controller

There is no prerequisite for taking this course.

Upon successful completion of the course, delegates will receive a certificate of completion, acknowledging their proficiency in the subject matter.

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?