HACKING ENTERPRISES: EXPLOITING IN.SECURITY

If you’re looking to understand the many ways in which an attacker may gain access to and exploit your network, or if you just want to learn the art, this is the course for you.

You will be exposed to tools, tricks and methodologies used by pentesters and hackers alike. After training completes you’ll be eager to get practicing in the in.security labs with your complementary 14 days access.

This course offers an all-around experience and is ideal for anyone looking to advance their knowledge in technical cyber security.

 

Outline

Our immersive 4-day hands-on course simulates a full-scale enterprise attack scenario. It allows students to assess the situation at every stage of a complex multi-layered penetration test and teaches multiple ways to identify, enumerate, exploit and compromise an organisation.

Each topic is accompanied by practical exercises ensuring that underlying theory is reinforced by practical understanding and application. This course is ideal for system administrators, network engineers, penetration testers or anyone that wants to improve their technical security skills.

The agenda for our 4-day course is detailed below. Please note that 2 and 3-day versions of this training are avalible upon request. Contact us on [email protected] for further information. 

Day 1
  • An introduction into monitoring and alerting using our in-LAB ELK stack
  • Leveraging OSINT activities
  • Enumerating and targeting IPv4 and IPv6 hosts
  • Exposure to vulnerability assessment toolsets
  • Windows and Linux enumeration techniques
Day 2
  • Further Windows and Linux enumeration
  • Identifying and exploiting vulnerabilities
  • Phishing – Creation, execution and compromise using our in-LAB platform with live, simulated users
Day 3
  • Windows privilege escalation
  • Linux privilege escalation
  • Overcoming restrictions/policies within an Active Directory environment
  • Executing effective post-exploitation tasks
  • [email protected] cracking
  • Situational awareness and further enumeration of other subnets
  • Lateral movement and pivoting techniques – routing, tunnelling and SOCKS proxies
Day 4
  • Further lateral movement techniques
  • Abusing domain trusts to compromise the enterprise
  • Gaining persistence
  • Data exfiltration over OOB channels

To book a training course contact us at [email protected] or +44 (0)333 210 1337

Complementary Hackpack

After training completes you will receive the Exploiting in.security certificate as well as our hackpack (yours to keep) which includes:
 

  • A customised Raspberry Pi based on Kali Linux
  • Portable wireless keyboard/mouse
  • A copy of The Red Team Field Manual (RTFM)
  • 14-days lab access after training concludes
  • 14-days access to our Slack training support channel

Prerequsities

  • Working in Windows/Linux command line environments
  • You will need to bring a laptop with local administrator/root access

Upcoming Training

Details of all our scheduled courses can be found on our training schedule.

Whether you’re training for a qualification, learning how to break things or you want some high-level insight into the ways you may be attacked, we’ve got you covered.

Our courses are developed and delivered by trainers who have taught at many bespoke training events throughout the world, as well as Black Hat USA, Asia and EU.

We provide intensive and deeply practical hands-on training in hacking techniques, as well as a management course that helps identify what you need to be aware of without the technical know-how.

in.security training

WHERE?

We train anywhere and everywhere…

  • At your premises or required location
  • At a training location arranged by us
  • Through our training partners
  • Live virtual training
  • At special events and conferences throughout the year
in.security Certification

IN.SECURITY CERTIFICATE

This course doesn’t just test the theory, it tests your understanding and application of the content. After sitting the training course you will receive the Exploiting in.security certificate.

in.security Hack Lab

COMPLEMENTARY HACKLAB ACCESS

All students on our technical course will receive 14 days of free access to our labs after the course ends. Our training is intensive and we know it’s hard to retain everything learned during an event, so your extended access will allow you to continue to practice and sharpen your skills! If your insatiable thirst for hacking still isn’t satisfied you can also optionally purchase more time afterwards.

in.security Certification

WE DO THIS WITH A DIFFERENCE!

All students on our technical course will receive a complementary in.security hackpack! This includes a Raspberry Pi containing a pre-configured Kali Linux installation, a wireless mouse/keyboard, a copy of the Red Team Field Manual (RTFM), 14-days access to our labs and 14-days access to our Slack support channel!