On This Page

Hands-On Hacking Fundamentals

SensePost | August 4-5 & August 6-7



Overview

After getting students into the mindset of a real-world attacker, we start off explaining why vulnerabilities exist, how one would discover them and also what the next step is. This gets you into the mindset of a hacker and by exploiting real-world vulnerabilities yourselves, you start to see how attackers operate. It is very much hands on, you will target and exploit systems found in modern networks and corporations today.

This course is ideal for anyone just starting out in his or her journey into the exciting world of penetration testing and hacking or for those who work in an environment where they "need" to understand what attackers are doing and how attacks work.

Overview

Information security fundamentals
Working with a command-line interface (Linux and Windows)
An introduction to Kali Linux
Computer networking fundamentals
Discovering vulnerabilities & exploits: how to find, test and use them
Exploiting vulnerabilities in the network and application layer
Exploiting vulnerabilities in web applications and wireless networks

Each student will be provided with their own, private lab environment for the duration of the course. The lab provides a controlled environment for hands-on practical exercises throughout the course to re-enforce they concepts that have been taught.

Who Should Take this Course

This course is ideal for anyone just starting out in their journey into the exciting world of penetration testing and hacking or for those who work in an environment where they "need" to understand what attackers are doing and how attacks work.

Student Requirements

Students need to ensure they are comfortable with Internet fundamentals (how does it work), networking fundamentals and also operating system fundamentals. We will supply a series of pre-training information to you so you can study beforehand and be prepared when arriving at Blackhat.

No hacking experience is required for this course; this is a beginner's course. Enthusiasm is a must though!

What Students Should Bring

It is advisable that students should bring a laptop that is capable of running a Kali VMware image, However, with our move to a cloud environment, we've had students complete the entire course from an iPad using a browser to VNC into our Kali in the cloud instance

What Students Will Be Provided With

We have developed a training portal that will be made available to all students before they attend Black Hat. This portal allows you to register an account and gain access to the slides used and any prerequisite information we feel would help you get the best out of this course. All content for the course, including tools required and instructions to configure your environment, will be made available via the training portal before you start, which means less time setting up and more time for learning.

Access to this portal will not stop once the course has finished, allowing you to continue learning in the weeks/months after Black Hat.

Trainers

.