Extended Introduction to Hacking - Beginner Level
This four day course combines our hands-on hacking fundamentals and enterprise infrastructure hacking course into one extended course intended to take you from a beginner to intermediate penetration tester.
The first two days will give beginners everything they need to get started, from introductory concepts right through to immersive hands-on real exploitation. By the end of them you will have a good grasp of how vulnerabilities and exploits work, how attackers think about networks and systems, and you will have compromised several of them from infrastructure to web applications to Wi-Fi.
The next two days is all about compromising companies through their infrastructure. It will continue the journey from learning about an organisation right through to stealthy exploitation of their critical infrastructure.
If you're just starting your hacking career, consider yourself a beginner penetration testers or are a technically competent person wanting to understand how to go about compromising your organisation to better defend it, then this course is for you.
No equipment other than a web browser is needed. We make use of a fully cloud-based and individual virtual training lab, to which you can maintain access after the course. This means no interference from other students, a robust and safe practise environments, and time to experiment afterwards. The lab will be available to you after the course.
In this course we'll cover:
Day 1
The different ways hackers think and hacking makes you think
Setting up your environment, from getting your Kali ready to getting comfortable on the command line
Understanding vulnerabilities and exploits - how to find them and use them
Day 2
Finding and Hacking Infrastructure over the Internet
Hacking Web Applications and other custom applications
Hacking Wi-Fi and traffic interception/analysis
Day 3
Hacking methodologies
Organisational reconnaissance
Technical reconnaissance
Finding more advanced vulnerabilities
Exploiting more advanced vulnerabilities and trusts
Day 4
Post-Exploitation, Pivoting & Exfiltration
Introduction to Red Teaming
Introduction to Blue Teaming
Skills / Knowledge
- PenTesting
- Network