HACKING ENTERPRISES: UNDERSTANDING IN.SECURITY
If you’re looking to get an idea of how an attacker may gain access to and exploit your network, or if you just want to learn the art, this is the course for you.
You will be exposed to tools, tricks and methodologies used by pentesters and hackers alike. By the end of this 5-day event you’ll be eager to get practicing in the in.security labs with your complementary 14 days access.

This course offers an all-round experience and is ideal for anyone with basic/intermediate Windows/Linux skills and is looking to advance their knowledge in cyber security.

 

Outline

Our intermediate course covers a lot of popular topics and the content is structured in a way that allows you to fully understand how small pieces of information may allow an attacker access to critical infrastructure.

Each topic is accompanied by practical exercises ensuring that underlying theory is reinforced by practical understanding and application. This course is ideal for system administrators, network engineers, information security officers or anyone that wants to improve their technical security skills and advance within the expanding security sector.

At the end of the 5-day course you will receive our in.security hackpack (yours to keep, see below for details) for you to continue your learning. 

Your complementary hackpack includes:

  • A customised Raspberry Pi based on Kali Linux
  • Wireless keyboard/mouse
  • A copy of The Red Team Field Manual (RTFM)
  • 14-days lab access after training concludes
  • 14-days access to our Slack training support channel

Over the week we’ll be covering the following topics:

  • An introduction into infrastructure and application security assessments
  • An introduction into monitoring and alerting
  • Understanding the importance of and leveraging OSINT activities
  • Discovering, targeting and enumerating IPv4 and IPv6 hosts in local and remote networks
  • Exposure to vulnerability assessment toolsets
  • Identifying and exploiting vulnerabilities
  • Client-side attacks and targeting users in simulated phishing tests
  • Executing effective post-exploitation tasks
  • [email protected] cracking 101
  • Lateral movement and pivoting techniques (routing, tunnelling and SOCKS proxies)
  • Understanding and abusing domain trusts to compromise the enterprise
  • Gaining persistence in the environment

All students will have access to our in-lab shared resources including vulnerability scanners, phishing platforms and access to a Kibana interface to identify attacks from a defensive perspective.

On the last day you will sit an exam, hopefully attaining Understanding in.security certification!

To book a training course please contact us at [email protected] or +44 (0)333 210 1337

Prerequsities

Whilst we provide everything you need to know on the course, experience of working in Windows and Linux environments as well as using command line interfaces would be advantageous.

You will need to bring a laptop with local administrator/root access.

Upcoming Training

Details of all our scheduled courses can be found on our training schedule

On-premise training

Your on-premise training will include:

  • 5-days training at one of our venues
  • Training 09:00 – 17:00 
  • Morning/afternoon refreshments and lunch
  • in.security’s custom hackbox (yours to keep), which can either be used on the course or you can bring your own laptop
  • 14 days complementary hacklab access
  • Exam and certification

 

LONDON

February 4th – 8th 2019 | £2650 + VAT

Canada Water Culture Space
Surrey Quays Road
London
SE16 7AR

Live virtual training 

Your live virtual training will include:

  • 5-days interactive training via a popular online training platform
  • Training 09:00 – 17:00 (see below for applicable time zones)
  • in.security’s custom hackpack (yours to keep) which will be shipped to you in before the training starts, however, you will need your own laptop with local administrative access during the course.
  • 14 days complementary hacklab access
  • Exam and certification

Our live virtual training will be delivered in an interactive environment where students can discuss, share media and hack! 

Whether you’re training for a qualification, learning how to break things or you want some high-level insight into the ways you may be attacked, we’ve got you covered.

Our courses are developed and delivered by trainers who have taught at many bespoke training events throughout the world, as well as Black Hat USA, Asia and EU.

We provide intensive and deeply practical hands-on training in hacking techniques, as well as an management course that helps identify what you need to be aware of without the technical know-how.

If all of this wasn’t good enough already, booking two or more places on a single course gets you a 15% discount!

in.security training

WHERE?

We train anywhere and everywhere…

  • At your premises or required location
  • At a training location arranged by us
  • Through our training partners
  • Live virtual training
  • At special events and conferences throughout the year
in.security Certification

IN.SECURITY CERTIFICATION

This course doesn’t just test the theory, it tests your understanding and application of the content. On the last day of the course you’ll sit the Understanding in.security exam, hopefully gaining certification!

  • Tests both theory and practical skills learned on the course
  • Passing both theory and practical elements of the exam gains the Understanding in.security certification!
in.security Hack Lab

COMPLEMENTARY HACKLAB ACCESS

All students on our technical course, regardless of whether certification is obtained or not, will receive 14 days of free access to our labs after the course ends. Our training is intensive and we know it’s hard to retain everything learned during an event, so your extended access will allow you to continue to practice and sharpen your skills! If your insatiable thirst for hacking still isn’t satisfied you can also optionally purchase more time afterwards.
in.security Certification

WE DO THIS WITH A DIFFERENCE!

All students on our technical course, regardless of whether certification is achieved or not, will receive our in.security hackpack! This includes a Raspberry Pi containing a pre-configured, tailored Linux installation, a wireless mouse/keyboard, a copy of the Red Team Field Manual (RTFM), 14-days access to our labs and 14-days access to our Slack support channel!

Please email us on [email protected].security or call +44 (0)333 210 1337