Infrastructure Hacking icon

Infrastructure Hacking

Our three-day Infrastructure Hacking course for beginners.


Our Infrastructure Hacking course for beginners provides an introduction to infrastructure testing and familiarises participants with the basics of network hacking. It can be combined with our Web Hacking course to complete “The Art of Hacking”.

The course is now available as live online training and can be held for you individually or for your company. Contact us below with your requirements.

Get certified:
Complete the course wherever it suits you, then take an optional exam with Check Point to become an Infrastructure Hacking Check Point Certified Pen Testing Expert (CCPE).

Very organised and clearly presented. Great having hands-on experience with individuals ready to assist when help is needed

Black Hat USA delegate

One of the best classes I have taken in a long time. The contest was on point and kept me engaged. I am new to Cybersecurity after 25 years in App Development and am very pleased with what I have learned

Black Hat USA delegate

Really enjoyed the lab and the walkthroughs, it helped expedite the learning process.

Black Hat USA delegate

For security and IT decision-makers

What impact does a training course by Claranet Cyber Security really have on your team?

Start building up skills in your team to protect your systems, reduce the risk of exposure and make your company a less attractive target for attackers. At the end of the course, participants will be able to:

  • Use standard industry tools such as Nmap, Hydra and Metasploit to perform penetration tests on your infrastructure,
  • Find and exploit vulnerabilities in your infrastructure, including those that would lead to an initial attack, attack chain, privilege escalation, persistence and more,
  • Identify and recommend remedial action for common misconfigurations,
  • Understand and explain infrastructure-based hacking methods for both Windows and Linux, and how they link to attacks across the entire kill chain,
  • Adapt their approach to suit different operating systems,
  • Trace security tests and other offensive and defensive measures back to authentic attack vectors.
  • Overview
  • Details
  • Requirements and participant profile
  • Download the brochure

This course introduces you to a wealth of hacking tools and techniques crucial in getting started in this dynamic field of hacking. The course begins with laying a foundation and discussing the basic concepts, gradually building up to the level where you not only use the tools and techniques to hack various components involved in infrastructure hacking, but also walk away with a solid understanding of the concepts on how these tools work and therefore ready to face the real world.

  • Introduction to infrastructure testing
  • Gain practical experience with the tools you will also be using in the future
  • Learn the basic infrastructure techniques
  • Once you have completed this course you will have the perfect basis to take more advanced courses

This is our entry-level infrastructure foundation course. A number of tools and techniques, backed up by a systematic approach on the various phases of hacking will be discussed during so if you would like to step into a career of Ethical Hacking / Pen Testing with the right amount of knowledge, then this is a great step forward.

The Art of Port Scanning

  • Basic concepts of Hacking Methodology
  • Enumeration techniques and Port Scanning

The Art of Online Password Attacks

  • Configure Online Password Attack
  • Exploiting network service misconfiguration

The Art of Hacking Databases

  • MySql, Postgres
  • Attack chaining techniques

Metasploit Basics

  • Exploitation concepts, Manual Exploitation Methodology
  • Metasploit framework

Password Cracking

  • Understanding basic concepts of cryptography
  • Design offline brute force attack

Hacking Unix

  • Linux vulnerabilities, misconfiguration
  • Privilege escalation techniques

Hacking Application Servers on Unix

  • Web Server misconfiguration
  • Multiple exploitation techniques

Hacking Third Party CMS Software

  • CMS Software
  • Vulnerability scanning and exploitation

Windows Enumeration

  • Windows enumeration techniques and configuration issues
  • Attack chaining

Client-Side Attacks

  • Various Windows client-side attack techniques

Privilege Escalation on Windows

  • Post exploitation
  • Windows Privilege escalation techniques

Hacking Application Servers on Windows

  • Web Server misconfiguration
  • Exploiting Application servers

Post Exploitation

  • Metasploit Post exploitation techniques
  • Windows 10 Security features and different bypass techniques

Hacking Windows Domains

  • Understanding Windows Authentication
  • Gaining access to Domain Controller

Who Should Take This Class?

Security enthusiasts
Anybody who wishes to make a career in this domain and gain knowledge of networks and applications
System Administrators
SOC Analysts
Network Engineers
Pen Testers who are wanting to level up their skills

You will need:

The only requirement for this course is that you bring your laptop with an admin/root access. VPN access to our state-of-the-art hacklab, which is hosted in our data centre in the UK where required tools/virtual machines (VMs) will be found, will be provided during the course. We also provide a dedicated Kali VM to each attendee on the hacklab, so you don’t need to bring any VMs with you, all you need is to install the VPN client and you are good to go!


Course Information