Hacking 101

Classroom: 750€ +Iva

REF: NSSH101 Catálogo: Cybersecurity Área: Claranet Cyber Security (NotSoSecure), Cybersecurity

Duração icon


1 dia

Próxima Data icon

Próxima Data:


Local icon



This 1-day course will teach you the foundations of penetration testing and how to find and exploit vulnerabilities within different technologies. This introductory course will train attendees in understanding penetration testing, and provide background information, risks and vulnerabilities associated with different systems and provide insight to how the mindset of a hacker works. Students will also get access to an online training environment platform which will be used to practice the concepts taught during the course.

Complete the course wherever it suits you and afterwards you can take an optional exam with Check Point and become a Hacking 101 Check Point Certified Pen Testing Associate (CCPA).


System administrators, Web Developers, IT Managers, Security enthusiasts, Anyone interested in Penetration testing and ethical hacking. (No prior experience is required to take this course)

  • Área: Cybersecurity

  • Certificação Associada: Hacking 101 Check Point Certified Pen Testing Associate (CCPA)

Quero inscrever-me.

*Curso disponível em Live Training


Hacking Fundamentals

  • Hacking History 101
  • Hacking in 2018
  • CIA Triad
  • Art of Hacking methodology
  • Introduction to Kali Linux

Windows Security

  • Windows Fundamentals
  • Windows Password Hashing
  • Workgroups vs Domains
  • Windows Authentication
  • Windows Exploitation 101
  • Client-Side attacks
  • Case Study: WannaCry

Hacking CMS Software

  • Introduction to Content Management Systems
  • Enumerating CMS Platforms
  • Hacking WordPress
  • Joomla Exploitation

Network Security

  • Network Fundamentals
  • MAC Addressing and Network Addressing
  • Introduction to Port addressing
  • Understanding the OSI Layer and TCP/IP Model
  • Domain Name System (DNS) Attack Surface
  • TCP vs UDP
  • Network Scanning
  • Shodan

Linux Security

  • Introduction to Linux
  • Linux Filesystem Hierarchy
  • Linux File Permissions
  • Berkeley Rsh/Rlogin Services
  • Network File System (NFS) Security
  • Missing Security Patches
  • Vulnerability Identification
  • Case Study: Shellshock
  • Introduction to Metasploit

Web Security

  • HTTP Protocol Basics
  • Understanding Web Application Attack Surface
  • SQL Injection
  • Case Study: T alkT alk SQL Injection
  • Command Injection
  • Cross-Site Scripting (XSS)
  • Open Redirect

Wireless Security

  • WiFi Security 101
  • Wired Equivalent Privacy (WEP)
  • Wi-Fi Protected Access (WPA)
  • WPA2 Security
  • Wi-Fi Protected Setup (WPS) flaws
  • Rogue Access Points Attacks


No setup and no VPN required. Delegates should bring their own laptop with Windows OS installed (either natively or running a VM) with admin access to perform tasks e.g.installing software, disabling anti-virus etc. Devices that don’t have an Ethernet connection (e.g. MacBook Air, tablets etc.) are not supported.

Quero inscrever-me.


Facebook logo Linkedin logo Email icon
We meet future and then we make it spark slogan

Precisas de ajuda a encontrar o teu futuro?

The answer you entered for the CAPTCHA was not correct.

A background of the Ignit sparks