The Art of Hacking (Bootcamp)

Classroom: 3,750€ +Iva

REF: NSSAoH Catálogo: Cybersecurity Área: Claranet Cyber Security (NotSoSecure), Cybersecurity

Duração icon


5 dias

Próxima Data icon

Próxima Data:

27 a 31 Mar 2023

Local icon



The Industry Leading Hacking Class for Cybersecurity Professionals

Securing customer data is often crucial when deploying and managing web applications and network infrastructure. As such, IT administrators and web developers require security knowledge and awareness in order to secure their environment. Due to this requirement, operational staff often require hands-on course and experience to identify, control and prevent organisational threats.

This course teaches attendees a wealth of techniques to compromise the security of various operating systems, networking devices and web application components. The course starts from the very basic and builds up to the level where attendees can not only use the tools and techniques to hack various components involved in infrastructure and web hacking, but also gain solid understanding of the concepts on which these tools are based. This course combines a formal hacking methodology with a variety of tools to teach the core principles of ethical hacking.


System Administrators, Web Developers, SOC analysts, Penetration Testers, network engineers, security enthusiasts and anyone who wants to take their skills to the next level.

  • Área: Cybersecurity

  • Certificação Associada: Check Point Certified Pen Testing Associate (CCPA)

Quero inscrever-me.

*Curso disponível em Live Training


The Art Of Port Scanning

  • Basic concepts of Hacking Methodology
  • Enumeration techniques and Port scanning

The Art Of Online Password Attacks

  • Configure online password attack
  • Exploiting network service misconfiguration

The Art Of Hacking Databases

  • Mysql, Postgres
  • Attack chaining techniques

Metasploit Basics

  • Exploitation concepts, Manual exploitation methodology
  • Metasploit framework

Password Cracking

  • Understanding basic concepts of cryptography,
  • Design offline brute force attack

Hacking Unix

  • Linux vulnerabilities, misconfiguration
  • Privilege escalation techniques

Hacking Application Servers On Unix

  • Web server misconfiguration
  • Multiple exploitation techniques

Hacking Third Party Cms Software

  • CMS Software
  • Vulnerability scanning & exploitation

Windows Enumeration

  • Windows Enumeration techniques & Configuration Issues
  • Attack chaining

Client-Side Attacks -Various Windows client-side attack techniques

Privilege Escalation On Windows

  • Post exploitation
  • Windows Privilege escalation techniques

Hacking Application Servers On Windows

  • Web server misconfiguration
  • Exploiting Application servers

Post Exploitation

  • Metasploit Post exploitation techniques
  • Window 10 Security features & different bypass techniques

Hacking Windows Domains

  • Understanding Windows Authentication
  • Gaining access to Domain Controller

Understanding The Http Protocol

  • HTTP Protocol Basics
  • Introduction to proxy tools

Information Gathering

  • Enumeration Techniques
  • Understanding Web Attack surface

Username Enumeration & Faulty Password Reset

  • Attacking Authentication and Faulty Password mechanisms

Issues With Ssl/Tls

  • SSL/TLS misconfiguration

Authorization Bypass

  • Logical Bypass techniques
  • Session related issues

Cross Site Scripting (Xss)

  • Various types of XSS
  • Session Hijacking & other attacks

Cross Site Request Forgery (Csrf)

  • Understanding CSRF attack

Sql Injection

  • SQL Injection types
  • Manual Exploitation

Xml External Entity (Xxe) Attacks

  • XXE Basics
  • XXE exploitation

Deserialization Vulnerabilities

  • Serialization Basics
  • PHP Deserialization Attack

Insecure File Uploads

  • Attacking File upload functionality

Components with Known Vulnerabilities

  • Understanding risks known vulnerabilities
  • Known vulnerabilities leading to critical exploits

Insufficient Logging and Monitoring

  • Understanding importance of logging and monitoring
  • Common pitfalls in logging and monitoring


  • Understanding formula Injection attack
  • Understanding Open Redirection attack


Students should bring their own laptop, and must have administrative access to perform tasks like install software, disable antivirus etc. Devices that don’t have an Ethernet connection (e.g. MacBook Air, tablets etc.) are not supported.

Quero inscrever-me.


Facebook logo Linkedin logo Email icon
We meet future and then we make it spark slogan

Precisas de ajuda a encontrar o teu futuro?

The answer you entered for the CAPTCHA was not correct.

A background of the Ignit sparks