Our Infrastructure Hacking course for beginners provides an introduction to infrastructure testing and familiarises participants with the basics of network hacking. It can be combined with our Web Hacking course to complete “The Art of Hacking”.
The course is now available as live online training and can be held for you individually or for your company. Contact us below with your requirements.
Get certified:
Complete the course wherever it suits you, then take an optional exam with Check Point to become an Infrastructure Hacking Check Point Certified Pen Testing Expert (CCPE).
For security and IT decision-makers
What impact does a training course by Claranet Cyber Security really have on your team?
Start building up skills in your team to protect your systems, reduce the risk of exposure and make your company a less attractive target for attackers. At the end of the course, participants will be able to:
- Use standard industry tools such as Nmap, Hydra and Metasploit to perform penetration tests on your infrastructure,
- Find and exploit vulnerabilities in your infrastructure, including those that would lead to an initial attack, attack chain, privilege escalation, persistence and more,
- Identify and recommend remedial action for common misconfigurations,
- Understand and explain infrastructure-based hacking methods for both Windows and Linux, and how they link to attacks across the entire kill chain,
- Adapt their approach to suit different operating systems,
- Trace security tests and other offensive and defensive measures back to authentic attack vectors.
This course introduces you to a wealth of hacking tools and techniques crucial in getting started in this dynamic field of hacking. The course begins with laying a foundation and discussing the basic concepts, gradually building up to the level where you not only use the tools and techniques to hack various components involved in infrastructure hacking, but also walk away with a solid understanding of the concepts on how these tools work and therefore ready to face the real world.
- Introduction to infrastructure testing
- Gain practical experience with the tools you will also be using in the future
- Learn the basic infrastructure techniques
- Once you have completed this course you will have the perfect basis to take more advanced courses
This is our entry-level infrastructure foundation course. A number of tools and techniques, backed up by a systematic approach on the various phases of hacking will be discussed during so if you would like to step into a career of Ethical Hacking / Pen Testing with the right amount of knowledge, then this is a great step forward.
The Art of Port Scanning
- Basic concepts of Hacking Methodology
- Enumeration techniques and Port Scanning
The Art of Online Password Attacks
- Configure Online Password Attack
- Exploiting network service misconfiguration
The Art of Hacking Databases
- MySql, Postgres
- Attack chaining techniques
Metasploit Basics
- Exploitation concepts, Manual Exploitation Methodology
- Metasploit framework
Password Cracking
- Understanding basic concepts of cryptography
- Design offline brute force attack
Hacking Unix
- Linux vulnerabilities, misconfiguration
- Privilege escalation techniques
Hacking Application Servers on Unix
- Web Server misconfiguration
- Multiple exploitation techniques
Hacking Third Party CMS Software
- CMS Software
- Vulnerability scanning and exploitation
Windows Enumeration
- Windows enumeration techniques and configuration issues
- Attack chaining
Client-Side Attacks
- Various Windows client-side attack techniques
Privilege Escalation on Windows
- Post exploitation
- Windows Privilege escalation techniques
Hacking Application Servers on Windows
- Web Server misconfiguration
- Exploiting Application servers
Post Exploitation
- Metasploit Post exploitation techniques
- Windows 10 Security features and different bypass techniques
Hacking Windows Domains
- Understanding Windows Authentication
- Gaining access to Domain Controller
Who Should Take This Class?
Security enthusiasts
Anybody who wishes to make a career in this domain and gain knowledge of networks and applications
System Administrators
SOC Analysts
Network Engineers
Pen Testers who are wanting to level up their skills
You will need:
The only requirement for this course is that you bring your laptop with an admin/root access. VPN access to our state-of-the-art hacklab, which is hosted in our data centre in the UK where required tools/virtual machines (VMs) will be found, will be provided during the course. We also provide a dedicated Kali VM to each attendee on the hacklab, so you don’t need to bring any VMs with you, all you need is to install the VPN client and you are good to go!