25.7.12
This website uses cookies to ensure you get the best experience on our website. Learn more

Extended Introduction to Hacking - Beginner Level

This four day course combines our hands-on hacking fundamentals and enterprise infrastructure hacking course into one extended course intended to take you from a beginner to intermediate penetration tester. The first two days will give beginners everything they need to get started, from introductory concepts right through to immersive hands-on real exploitation. By the end of them you will have a good grasp of how vulnerabilities and exploits work, how attackers think about networks and systems, and you will have compromised several of them from infrastructure to web applications to Wi-Fi. The next two days is all about compromising companies through their infrastructure. It will continue the journey from learning about an organisation right through to stealthy exploitation of their critical infrastructure. If you're just starting your hacking career, consider yourself a beginner penetration testers or are a technically competent person wanting to understand how to go about compromising your organisation to better defend it, then this course is for you. No equipment other than a web browser is needed. We make use of a fully cloud-based and individual virtual training lab, to which you can maintain access after the course. This means no interference from other students, a robust and safe practise environments, and time to experiment afterwards. The lab will be available to you after the course. In this course we'll cover: Day 1 The different ways hackers think and hacking makes you think Setting up your environment, from getting your Kali ready to getting comfortable on the command line Understanding vulnerabilities and exploits - how to find them and use them Day 2 Finding and Hacking Infrastructure over the Internet Hacking Web Applications and other custom applications Hacking Wi-Fi and traffic interception/analysis Day 3 Hacking methodologies Organisational reconnaissance Technical reconnaissance Finding more advanced vulnerabilities Exploiting more advanced vulnerabilities and trusts Day 4 Post-Exploitation, Pivoting & Exfiltration Introduction to Red Teaming Introduction to Blue Teaming

Skills / Knowledge

  • PenTesting
  • Network