Infrastructure hacking training icon

Infrastructure hacking training

Our 3 day intermediate level infrastructure hacking training class.

This is a 3-day entry-level infrastructure hacking training course.

This is our entry-level infrastructure security testing course and also a recommended pre-requisite course before enrolling for our “Advanced Infrastructure Hacking” course. This foundation course familiarises the attendees with the basics of network hacking. A number of tools and techniques, backed up by a systematic approach on the various phases of hacking will be discussed during this course. If you would like to step into a career of Ethical Hacking / Pen Testing with the right amount of knowledge, this is the right course for you.

This course introduces the attendees with a wealth of hacking tools and techniques crucial in getting started in this dynamic field of hacking. The course begins with laying a foundation for everyone by discussing the basic concepts and gradually builds up to the level where attendees not only use the tools and techniques to hack various components involved in infrastructure hacking, but also walk away with a solid understanding of the concepts on how these tools work and therefore ready to face the real world.

Get certified:

Once you have completed the course, you can take an optional exam with Check Point whenever it suits you, and become a Check Point Certified Pen Testing Expert (CCPE).


2023 Edition


3 day practical class


Available by Partners


Live, online available


Hack-Lab for 30 days


Basic

Course Overview

This is our entry-level infrastructure foundation course. A number of tools and techniques, backed up by a
systematic approach on the various phases of hacking will be discussed during so if you would like to step
into a career of Ethical Hacking / Pen Testing with the right amount of knowledge, then this is a great step
forward.


See what our training roadmap
covers.

Upcoming courses

Click here for more courses

Enquire about your training

We provide training directly (live, online or in person) and also work with a range of training partners in different locations around the globe for classroom or live, online training. Please contact us with details of your requirement and we will recommend the best route to access our amazing training.

The course can also be booked directly through our accredited training partners.

If booked through Check Point, Cyber-Security Learning Credits are accepted for this course.

Check Point


Proud to be selected as part of QA's extensive training portfolio.

QA Training

For security and IT decision makers

What’s the real impact of training your team through NotSoSecure?

Start to build the skills and confidence within your team to harden your infrastructure and make your
organisation a less attractive target for attackers. Trained delegates can:

  • Use industry-standard tools, like Nmap, Hydra, and Metasploit, to perform penetration testing against your
    infrastructure.
  • Find and exploit vulnerabilities in your infrastructure, including those that would lead to initial
    exploitation, attack chaining, privilege escalation, persistence, and more.
  • Identify and recommend remediations for common misconfigurations.
  • Understand and explain infrastructure-based hacking methodology for both Windows and Linux and tie this to
    attacks across the kill chain.
  • Adapt their approach for different operating systems.
  • Relate security testing and other offensive and defensive measures back to authentic attack vectors.

Course Details

You will be able to:

  • Obtain a foothold in infrastructure testing
  • Gain practical experience with the tools that will last you well into the future
  • Learn core infrastructure techniques
  • Leave with the basics so you can take your testing knowledge forward into our more Advanced
    Infrastructure topics

You will receive:

Access to part of our Hack-Lab, our online course environment. This gives you plenty of time to practice the
concepts taught during the course. There are challenges, examples and demos to get to grips with, and all the
support you need.

What you can take away from the course:

This course introduces you to a wealth of hacking tools and techniques crucial in getting started in this dynamic
field of hacking. The course begins with laying a foundation and discussing the basic concepts, gradually building
up to the level where you not only use the tools and techniques to hack various components involved in
infrastructure hacking, but also walk away with a solid understanding of the concepts on how these tools work and
therefore ready to face the real world.

Details of the course content:

THE ART OF PORT SCANNING

  • Basic concepts of Hacking Methodology
  • Enumeration techniques and Port scanning

THE ART OF ONLINE PASSWORD ATTACKS

  • Configure online password attack
  • Exploiting network service misconfiguration

THE ART OF HACKING DATABASES

  • Mysql, Postgres
  • Attack chaining techniques

METASPLOIT BASICS

  • Exploitation concepts, Manual exploitation methodology
  • Metasploit framework

PASSWORD CRACKING

  • Understanding basic concepts of cryptography
  • Design offline brute force attack

HACKING UNIX

  • Linux vulnerabilities, misconfigurations
  • Privilege escalation techniques

HACKING APPLICATION SERVERS ON UNIX

  • Web server misconfiguration
  • Multiple exploitation techniques

HACKING THIRD PARTY CMS SOFTWARE

  • CMS Software
  • Vulnerability scanning & Exploitation

WINDOWS ENUMERATION

  • Windows Enumeration techniques & Configuration Issues
  • Attack chaining

CLIENT-SIDE ATTACKS

  • Various Windows client-side attack techniques

PRIVILEGE ESCALATION ON WINDOWS

  • Post exploitation
  • Windows Privilege escalation techniques

HACKING APPLICATION SERVERS ON WINDOWS

  • Web server misconfiguration
  • Exploiting Application servers

POST EXPLOITATION

  • Metasploit Post exploitation techniques
  • Window 10 Security features & different bypass techniques

HACKING WINDOWS DOMAINS

  • Understanding Windows Authentication
  • Gaining access to Domain Controller

Prerequisites

Who Should Take This Class?

  • Security enthusiasts
  • Anybody who wishes to make a career in this domain and gain knowledge of networks and
    applications
  • System Administrators
  • SOC Analysts
  • Network Engineers
  • Pen Testers who are wanting to level up their skills

You will need:

The only requirement for this course is that you bring your laptop with an admin/root access. VPN access to our
state-of-the-art hacklab, which is hosted in our data centre in the UK where required tools/virtual machines (VMs)
will be found, will be provided during the course. We also provide a dedicated Kali VM to each attendee on the
hacklab, so you don’t need to bring any VMs with you, all you need is to install the VPN client and you are good
to go!

Basic Infrastructure Hacking

Course Information

You can download a copy of the course information below.

In addition you will also be provided with a student pack, handouts and cheat-sheets if appropriate.

Download the course information

Your Training Roadmap

Offensive Classes

Hacking training for all levels: new to advanced. Ideal for those preparing for certifications such as CREST
CCT (ICE), CREST CCT (ACE), CHECK (CTL), TIGER SST as well as infrastructure / web application penetration
testers wishing to add to their existing skill set.

Defensive Classes

Giving you the skills needed to get ahead and secure your business by design. We specialise in application
security (both secure coding and building security testing into your software development lifecycle) and cloud
security. Build security capability into your teams enabling you to move fast and stay secure.

Testimonials

Very impressed with the lab environment. Course is packed with Information and exciting challenges.
Excellent Content and in-depth presentation. Loved the practice timing and walk-through. The extended lab
access is helpful to practice after the class."

Delegate, Black Hat USA

Just completed an excellent course. Please pass on my thanks and regards to the teacher, he did an
excellent job."

Delegate, Black Hat USA

It was really, very good."

Delegate, Basic Infrastructure Hacking

I've had a great training experience and learned very cool infrastructure hacking techniques"

Delegate, Basic Infrastructure Hacking

It provided me with the latest Information Security research & development"

Delegate, Black Hat USA

Our accreditations

Crest
Check penetration testing
Cyber essentials
CEH Accreditation
CCISO Accreditation
CISSP Accreditation
CRISC Accreditation
OSCE Accreditation