The Art of Hacking 2020 Edition

Provided by

About the course

The Art of Hacking
2020 Edition


Securing customer data is often crucial when deploying and managing web applications and network infrastructure. As such, IT administrators and web developers require security knowledge and awareness in order to secure their environment. Due to this requirement, operational staff often require hands-on course and experience to identify, control and prevent organisational threats.

Class Overview
This introductory/intermediate technical course brings together Infrastructure Security and Web Application Security into a 5-day “Art of Hacking” course designed to teach the fundamentals of hacking. This hands-on course was written to address the market need around the world for a real hands-on, practical and hacking experience that focuses on what is really needed when conducting Pen Testing.


Class Details
This course teaches attendees a wealth of techniques to compromise the security of various operating systems, networking devices and web application components. The course starts from the very basic and builds up to the level where attendees can not only use the tools and techniques to hack various components involved in infrastructure and web hacking, but also gain solid understanding of the concepts on which these tools are based. This course combines a formal hacking methodology with a variety of tools to teach the core principles of ethical hacking.

Day 1
Infrastructure Basics

TCP/IP Basics
The Art of Port Scanning
Target Enumeration
Metasploit Basics
Password Cracking

Day 2
Hacking Unix, Databases and Applications

Hacking Recent Unix Vulnerabilities
Privilege Escalation Techniques
Hacking Databases
Hacking Application Servers
Hacking Third Party Applications (WordPress, Joomla, Drupal)

Day 3
Hacking Windows

Windows Enumeration
Hacking Recent Windows Vulnerabilities.
Hacking Third party Software (Browser, PDF, Java)
Windows Privilege Escalation
Post Exploitation: Dumping Secrets
Hacking Windows Domains

Day 4
Information Gathering, Profiling and Cross-Site Scripting

Understanding HTTP protocol
Identifying the Attack Surface
Username Enumeration
Information Disclosure
Issues with SSL/TLS
Authorization Bypass

Day 5
Injection, Flaws, Files and Hacks

Cross Site Scripting
Cross-Site Request Forgery
SQL Injection
XXE Attacks
OS Code Injection
Local/Remote File include
Insecure File Uploads
Deserialization Vulnerabilities

Who Should Take This Class?

  • System Administrators who are interested in learning how to exploit Windows and Linux systems
  • Web Developers who want to find and exploit common web application vulnerabilities
  • Network Engineers who want to secure and defend their network infrastructure from malicious attacks
  • Security enthusiasts new to the information security field who want to learn the art of ethical hacking
  • Security Consultants looking to relearn and refresh their foundational knowledge

Related article

Join our cyber security training courses this spring!