Select Search Category
Art of Hacking

This course teaches attendees a wealth of techniques to compromise the security of various operating systems, networking devices and web application components.

The course starts from the very basic and builds up to the level where attendees can not only use the hacking tools and techniques to hack various components involved in infrastructure and web hacking, but also gain solid understanding of the concepts on which these ethical hacking tools are based. This course combines a formal hacking methodology with a variety of tools to teach the core principles of ethical hacking.

Whether you're a beginner or a cyber security professional, the Art of Hacking course will teach you the essential skills required to become a professional ethical hacker.

Topics covered per day:
Infrastructure Basics
  • TCP/IP Basics
  • The Art of Port Scanning
  • Target Enumeration
  • Brute-Forcing
  • Metasploit Basics
  • Password Cracking
Hacking Unix, Databases and Applications
  • Hacking Recent Unix Vulnerabilities
  • Privilege Escalation Techniques
  • Hacking Databases
  • Hacking Application Servers
  • Hacking Third Party Applications (WordPress, Joomla, Drupal)
Hacking Windows
  • Windows Enumeration
  • Hacking Recent Windows Vulnerabilities.
  • Hacking Third party Software (Browser, PDF, Java)
  • Windows Privilege Escalation
  • Post Exploitation: Dumping Secrets
  • Hacking Windows Domains
Information Gathering, Profiling and Cross-Site Scripting
  • Understanding HTTP protocol
  • Identifying the Attack Surface
  • Username Enumeration
  • Information Disclosure
  • Issues with SSL/TLS
  • Authorization Bypass
Injection, Flaws, Files and Hacks
  • Cross Site Scripting
  • Cross-Site Request Forgery
  • SQL Injection
  • XXE Attacks
  • OS Code Injection
  • Local/Remote File include
  • Insecure File Uploads
  • Deserialization Vulnerabilities
Session FAQ
  • System Administrators who are interested in learning how to exploit Windows and Linux systems
  • Web Developers who want to find and exploit common web application vulnerabilities
  • Network Engineers who want to secure and defend their network infrastructure from malicious attacks
  • Security enthusiasts new to the information security field who want to learn the art of ethical hacking
  • Security Consultants looking to relearn and refresh their foundational knowledge
  • Basic familiarity with Windows and Linux systems e.g. how to view a system’s IP address, installing software, file management
  • Basic understanding of Network fundamentals e.g. IP addressing, knowledge of protocols such as ICMP, HTTP and DNS
  • Basic understanding of HTTP fundamentals e.g. Structure of an HTTP request, HTTP method verbs, HTTP response codes
  • The above requirements are not mandatory but are recommended due to the pace of the class.

Hardware Requirements: Students should bring their own laptop, and must have administrative access to perform tasks such as software installations, disable antivirus etc. Devices that don’t have an Ethernet connection (e.g. MacBook Air, tablets etc.) are not supported.

Software Requirements: Windows 7 or 10 operating systems are recommended for the class. Students will be required to install OpenVPN client, an SSH client such as Putty and Mozilla Firefox. Installation instructions will also be provided on the first day of the class.

Access to a hacking lab not just during the course but for 30 days after the class too. This gives them plenty of time to practice the concepts taught in the class.

Our courses also come with detailed answer sheets. That is a step by step walkthrough of how every exercise within the class needs to be solved. These answer sheets are also provided to students at the end of the class.

Pratik Shah