On This Page

Enterprise Infrastructure Bootcamp

SensePost | November 10-11


This course looks at the methods and approaches one would take when performing internal and external network penetration tests. In our fully functional lab, your aim will be to think like an attacker and map out your target, find weaknesses and fully exploit trust relationships in place. Using scenarios along with presentations, this course is a healthy mix of thinking, strategies and the methodologies you might need for every step along the way. If you are looking for practical, hands on approach to learning how to pwn a network, then this is where you will find it.

Day One:
  • A quick review of key concepts and technologies
  • Seeing the wood for the trees - how to perform Internet & internal reconnaissance
  • Footprinting and fingerprinting
  • Vulnerability discovery
  • Exploiting known vulnerabilities

Day Two
  • You've found a way in, now what?
  • Post exploitation techniques
  • Digging tunnels to China
  • How to move around on the network
  • Attacking active directory
  • Obtaining the crown jewels of an organization
  • Hunting for rabbits
  • Data exfiltration introduction

Who Should Take this Course

This course is ideal for those wanting to learn how attackers are gaining access to networks, penetration testers who are new to network penetration testing, and/or those who wish to brush up on effective ways to own companies from the net and internally.

Student Requirements

Students need to ensure they have the necessary level of skill. No hacking experience is required for this course, but a solid technical grounding is an absolute must.

What Students Should Bring

  • Laptop with at least 4GB RAM and 20 GB free space
  • Working USB port

What Students Will Be Provided With

All course materials, slides, tools, and content will be supplied.


All SensePost trainers are active penetration testers who own networks, applications, mobiles and humans on a daily basis.