If you’re looking to understand the many ways in which an attacker may gain access to and exploit your network, or if you just want to learn the art, this is the course for you.

You will be exposed to tools, tricks and methodologies used by pentesters and hackers alike. By the end of this 5-day event you’ll be eager to get practicing in the in.security labs with your complementary 14 days access.

This course offers an all-round experience and is ideal for anyone looking to advance their knowledge in technical cyber security.



Our immersive hands-on training is aimed at a technical audience looking to delve into or increase their presence in the world of security. The training covers a lot of popular security topics and will help students fully understand a variety of ways in which an attacker could access and exploit critical infrastructure.

Each topic is accompanied by practical exercises ensuring that underlying theory is reinforced by practical understanding and application. This course is ideal for system administrators, network engineers, information security officers or anyone that wants to improve their technical security skills and advance within the expanding security sector.

At the end of the 5-day course you will receive our in.security hackpack (yours to keep) for you to continue your learning.

Complementary Hackpack 

      • A customised Raspberry Pi based on Kali Linux
      • Portable wireless keyboard/mouse
      • A copy of The Red Team Field Manual (RTFM)
      • 14-days lab access after training concludes
      • 14-days access to our Slack training support channel

      Over the week we’ll be covering the following topics:

      Day 1

      • An introduction into infrastructure and application security assessments
      • An introduction into monitoring and alerting using our in-LAB ELK stack
      • Leveraging OSINT activities
      • Enumerating and targeting IPv4 and IPv6 hosts
      • Exposure to vulnerability assessment toolsets
      • Windows and Linux enumeration techniques

      Day 2

      • Further Windows and Linux enumeration
      • Identifying and exploiting vulnerabilities
      • Phishing – Creation, execution and compromise using our in-LAB platform with live, simulated users

      Day 3

      • Windows privilege escalation
      • Linux privilege escalation
      • Overcoming restrictions/policies within an Active Directory environment
      • Executing effective post-exploitation tasks
      • [email protected] cracking
      • Situational awareness and further enumeration of other subnets
      • Lateral movement and pivoting techniques – routing, tunnelling and SOCKS proxies

      Day 4

      • Further lateral movement techniques
      • Abusing domain trusts to compromise the enterprise
      • Gaining persistence
      • Data exfiltration over OOB channels

      Day 5

      • Theory exam
      • Practical Exam


      All students will have access to our in-lab shared resources including vulnerability scanners, phishing platforms and access to a Kibana interface to identify attacks from a defensive perspective.

      On the last day you will sit an exam, hopefully attaining Understanding in.security certification!

      To book a training course please contact us at [email protected] or +44 (0)333 210 1337


      Whilst we provide everything you need to know on the course, experience of working in Windows and Linux environments as well as using command line interfaces would be advantageous.

      You will need to bring a laptop with local administrator/root access.

      Upcoming Training

      Details of all our scheduled courses can be found on our training schedule

      Whether you’re training for a qualification, learning how to break things or you want some high-level insight into the ways you may be attacked, we’ve got you covered.

      Our courses are developed and delivered by trainers who have taught at many bespoke training events throughout the world, as well as Black Hat USA, Asia and EU.

      We provide intensive and deeply practical hands-on training in hacking techniques, as well as an management course that helps identify what you need to be aware of without the technical know-how.

      If all of this wasn’t good enough already, booking two or more places on a single course gets you a 15% discount!

      in.security training


      We train anywhere and everywhere…

      • At your premises or required location
      • At a training location arranged by us
      • Through our training partners
      • Live virtual training
      • At special events and conferences throughout the year
      in.security Certification


      This course doesn’t just test the theory, it tests your understanding and application of the content. On the last day of the course you’ll sit the Understanding in.security exam, hopefully gaining certification!

      • Tests both theory and practical skills learned on the course
      • Passing both theory and practical elements of the exam gains the Understanding in.security certification!
      in.security Hack Lab


      All students on our technical course, regardless of whether certification is obtained or not, will receive 14 days of free access to our labs after the course ends. Our training is intensive and we know it’s hard to retain everything learned during an event, so your extended access will allow you to continue to practice and sharpen your skills! If your insatiable thirst for hacking still isn’t satisfied you can also optionally purchase more time afterwards.
      in.security Certification


      All students on our technical course, regardless of whether certification is achieved or not, will receive our in.security hackpack! This includes a Raspberry Pi containing a pre-configured, tailored Linux installation, a wireless mouse/keyboard, a copy of the Red Team Field Manual (RTFM), 14-days access to our labs and 14-days access to our Slack support channel!

      Please email us on [email protected].security or call +44 (0)333 210 1337