The Art of Hacking (AoH) is a fundamental training course for those who want to enter the world of IT security and penetration testing, or for those who want to consolidate and formalise their skills and demonstrate their knowledge through practical work
At the end of the course, participants will be able to:
- Discover and fingerprint systems and services available in their infrastructure,
- Exploit Windows and Linux operating systems through a variety of known vulnerabilities,
- Perform brute force attacks with passwords to compromise services and gain access to a host,
- Hack application servers and content management systems to gain access to customer data,
- Carry out client-side attacks and execute code on the target computer,
- Identify common web application vulnerabilities and practically introduce security measures into their software development lifecycle.
Course participants receive:
- A PDF copy of all course materials used during the course, including the instructor’s slides, the cheat sheets for the tools, and instructions on how to work through the course
- Access to NotSoSecure’s Art of Hacking Lab for 30 days after the end of the course
This is a modal window.
Course description:
This beginner and advanced level technical course combines infrastructure security and web application security in a five-day “Art of Hacking” course that teaches the basics of hacking. This hands-on course was designed to meet the global market need for real, practical hacking experience that focuses on what is really needed in pentesting.
Learning objectives:
This course provides participants with a wealth of techniques to compromise the security of various operating systems, network devices and web application components. It starts with very basic knowledge and builds up to a level where participants can not only apply the tools and techniques to hack various infrastructure components and hack on the web, but also gain a solid understanding of the concepts on which these tools are based. The course combines formal hacking methodology with a variety of tools to teach the basic principles of ethical hacking.
Duration and location of the course:
A five-day course that can be held in a classroom setting.
Additional accreditation:
Check Point Certified Penetration Testing Associate (CCPA).