Hacklabs has rebranded to Pure Security. Please visit our new website at https://www.pure.security for more information.

HackLabs: Infrastructure - Penetration Testing Course

Learn the ethical hacking techniques commonly used to breech and exploit corporate networks and be able to identify how and when they are used.  This course enables you to uncover vulnerabilities in operating systems, applications and IT networks and provides advice in applying appropriate countermeasures.

The Course educates participants on:

The methodology used to perform penetration testing.

  • How to compromise systems security
  • How to utilise tools to exploit vulnerable systems
  • How to apply countermeasures to protect an organisation from exploitation.
  • How to document your findings effectively to explain them to the business.

The Course teaches penetration testing techniques that quickly, efficiently and most importantly methodically uncover vulnerabilities  in operating systems, applications and networks.  Participants then learn how to use exploit tools to take advantage of vulnerable systems and what countermeasures should be applied to protect systems from exploitation.

This course focuses on Internet systems, Windows and UNIX system penetration and also covers other technologies including Wireless, Network Devices and VOIP.

Designed to combine theoretical teaching with practical application of the tools and methods learnt, it is expected that participants will be able to return to their workplace and immediately apply the tools and techniques learnt during The Course.  To assist in the learning process, each participant is provided with a machine loaded with the software and tools to use throughout the course and, on successful completion of the week, are given a Linux Live CD of security testing tools.

HackLabs are able to indicate the key areas that the team see day in day out as they are performing and researching the latest attack techniques to utilise in penetration testing for our client base, during the work we perform for them.

This course will provide an overview of:

  • Which tools to use,
  • How to use the tools, and
  • The methodology behind security testing.

Course Outline:

  • Base Tools
  • Internet Footprinting
  • Windows Exploitation
  • Unix Exploitation
  • Wireless Exploitation
  • RFID Exploitation
  • Social Engineering
  • VoIP Exploitation

Last Day of course is an all day lab in which students utilise all of the above techniques and technologies to simulate compromisng an organisation end to end.



Contact Us