On This Page

Basic Tools & Techniques for Hackers - Beginner Level

SensePost | March 29 - 30


Lifestyle today is based around the Internet. From banking, to shopping and leisure, everything has an Internet layer. Numerous media reports have stated the obvious that there is a chronic skills shortage with regards to defensive and offensive security.

This course sets you on course to beginning a career, or understanding more, about information security.

We start off explaining why vulnerabilities exist, how one would discover them and also what the next step is. This gets you into the mind-set of a hacker and by exploiting real-world vulnerabilities yourselves, you start to see how attackers operate.


  • Hacker Methodology
  • Information security fundamentals
  • Networking fundamentals
  • Network Recon
  • Passive and Active information gathering
  • Working with a command-line interface (Linux and Windows)
  • Intro to Kali 2.0
  • Making things easy with Scripting
  • Discovering vulnerabilities
  • Using Metasploit for evil
  • Exploiting vulnerabilities in networks and web applications
  • WIFI Testing and attacks

As with all of our courses, this is a hands-on course. You will get to break into numerous networks, applications, and devices over the two days to fully understand what basic attacks look like as well as understand how they are performed.

Who Should Take this Course

This course is ideal for anyone just starting out in their journey into the exciting world of penetration testing and hacking, or for those who work in an environment where they need to understand what attackers are doing and how attacks work. This is not a theoretical course at all; you will get your hands dirty and learn how to exploit networks, applications and wireless networks.

Student Requirements

Students need to ensure they have the necessary level of skill. No hacking experience is required for this course; this is a beginner's course. Enthusiasm is a must though!

What Students Should Bring

Students should bring a laptop that is capable of running a VMware image of Kali Linux 2.0. Ideally 8gb of ram free with a working alpha card wireless adapter.

What Students Will Be Provided With

We've developed an online training portal where all content, downloads, tools and information will be made available for you before the course, during the course and once the course is finished.

Students have access to the SensePost learning portal 2 weeks before the course starts and also one week after the course has finished. This means you can continue learning and attacking the targets when you get home.


We are SensePost.

Stuart Kennedy, ex-military, and now part of the SensePost assessment team where he is responsible for targeting and exploiting individuals and networks. When not doing that, he has a weird obsession for messing with radio signals.