An immersive hands-on course aimed at a technical audience looking to increase their presence in the world of security

You will be exposed to tools, tricks and methodologies used by pentesters and hackers alike. After training completes you’ll be eager to get practicing in the in.security labs with your complementary 14 days access.



Our 5-day hands-on course simulates a full-scale enterprise attack scenario. It allows students to assess the situation at every stage of a complex multi-layered penetration test and teaches multiple ways to identify, enumerate, exploit and compromise an organisation. Each topic is accompanied by practical exercises to ensure underlying theory is reinforced by practical understanding and application.

The training covers a multitude of security topics, is based around modern operating systems and using modern techniques, with an emphasis on exploiting configuration weaknesses rather than throwing traditional exploits. This means logical thinking and creativity will definitely be put to the test.

This course is ideal for system administrators, network engineers, penetration testers or anyone that wants to improve their technical security skills.

The agenda for our 2020 release is detailed below. Please note that 2, 3 and 4-day condensed versions of this training are available upon request. Contact us on [email protected] for further information. 

Day 1
  • Getting familiar with the MITRE ATT&CK framework
  • An introduction into monitoring and alerting using our in-LAB ELK stack
  • Leveraging OSINT activities
  • Enumerating and targeting IPv4 and IPv6 hosts
  • Linux enumeration (remote and local targets)
  • Living off the land tricks and techniques in Linux
Day 2
  • Linux shells, post exploitation and privilege escalation
  • [email protected] cracking (*nix specifics)
  • Kubernetes and container security
  • Living off the land tricks and techniques in Windows
  • Creating and executing phishing campaigns against our simulated enterprise users
Day 3
  • [email protected] cracking (Windows specifics) 
  • Windows enumeration (remote and local targets)
  • Windows exploitation and privilege escalation techniques
  • Windows Defender / AMSI and UAC bypasses
  • [email protected] cracking (Windows specifics)
  • Defensive monitoring
  • Bypassing AppLocker, PowerShell CLM and Group Policy restrictions
  • RDP hijacking
  • Enumerating and extracting LAPS secrets
Day 4
  • Situational awareness and further enumeration of other subnets
  • Lateral movement, pivoting, routing, tunnelling and SOCKS proxies
  • Application enumeration and exploitation via pivots
  • Leveraging domain trusts
Day 5
  • Gaining persistence using Scheduled Tasks and WMI Event Subscriptions
  • Data exfiltration over OOB channels (ICMP and DNS)
  • Domain fronting and C2
  • CTF – putting newly learned skills into practice!

To book a training course check out our schedule or contact us at [email protected] 

Complementary Hackpack

After training completes you will receive a Hacking Enterprises completion certificate as well as our hackpack (yours to keep) which includes:

  • 14-days extended LAB access after training completes
  • 14-days access to a CTF platform including subnets/hosts not seen during training!
  • Access to in.security’s Slack channel
  • A Hak5 LAN Turtle SD
  • A copy of The Red Team Field Manual (RTFM)


  • A firm familiarity of Windows and Linux command line syntax
  • Understanding of networking concepts
  • Pentesting and/or SOC experience is advantageous but not required
  • You will need to bring a laptop with local administrator/root access

Upcoming Training

Details of all our scheduled courses can be found on our training schedule.

Whether you’re training for a qualification, learning how to break things or you want some high-level insight into the ways you may be attacked, we’ve got you covered.

Our courses are developed and delivered by trainers who have taught at many bespoke training events throughout the world, as well as Black Hat USA, Asia and EU.

We provide intensive and deeply practical hands-on training in hacking techniques, as well as a management course that helps identify what you need to be aware of without the technical know-how.

in.security training


We train anywhere and everywhere…

  • At your premises or required location
  • Through our training partners
  • Live virtual training
  • At special events and conferences throughout the year
in.security Certification


After training concludes you will receive our Hacking Enterprises certificate to add to your trophy collection.

in.security Hack Lab


All students on our technical course will receive 14 days of free access to our labs after the course ends. Our training is intensive and we know it’s hard to retain everything learned during an event, so your extended access will allow you to continue to practice and sharpen your skills! If your insatiable thirst for hacking still isn’t satisfied you can also optionally purchase more time afterwards.

in.security Certification


All students on our technical course will receive a complementary in.security hackpack! This includes a Hak5 LAN Turtle SD, a copy of the Red Team Field Manual (RTFM), 14-days access to our labs, a Slack support channel and a CTF including hosts not seen during training!