Advanced Infrastructure Attacks


5 Days

Download Full Syllabus Request a Quote
All Our Courses Now Also LIVE

Course Outline

IT and security teams are responsible for meeting cyber challenges that involve the technical layer of the organization. This course is designed to help such teams build and maintain secure networks and systems, protect data, implement vulnerability management programs, initiate strong access control measures, regularly monitor and test networks

and maintain consistent information security policies. This course also introduces various attack vectors that can be used by pen testers to breach internal systems. This course features hands-on simulations provided by @Cywar – a gamified training and assessment platform by HackerU Solutions.

Upcoming Meetings


Enumerating an Organization
  • Windows domain environment
  • Domain enumeration techniques
  • Manual enumeration
  • Automatic enumeration
Lateral Movement
  • Manual Lateral Movement
  • PsExec
  • WMI
  • WinRM
  • Pass the Hash
SMB Relay & Responder
  • Broadcasting
  • LLMNR Manipulation
  • Hash Evolution
  • Responder
  • SMB Relay
  • Inveigh
PowerShell as a Weapon
  • PowerShell Fundamentals
  • PowerShell ISE
  • PowerShell Modules
  • Attack with PowerShell
  • PowerShell to EXE
Office Exploitation
  • Macro & VBA
  • Word Exploitation
  • Excel as a weapon
  • PowerPoint exploit
  • Macro Obfuscation
  • SFX
  • Social Engineering technique
Exploiting Services
  • Basic Enumeration
  • Vulnerability search
  • Services features
  • SearchSploit
  • Misconfiguration bugs
  • RDP Enumeration
Veil Framework & Obfuscation
  • What is obfuscation?
  • Types of obfuscation
  • Packing
  • Various tools
  • Tools comparison
  • Multi-layered obfuscation
Reverse Shell & Tunneling
  • Shell
  • Reverse Shell
  • Remote connections
  • Firewall Evasion
  • ICMP Tunneling
  • SSH Tunneling
  • DNS Tunneling
Kerberoasting & Pass the Ticket
  • Kerberos Authentication
  • Kerberos Traffic Analysis
  • Kerberoasting
  • Pass the Ticket
  • Golden Ticket
  • Domain Replications
  • The students will receive a challenge and will try to hack according to the learning material to the targeted machine/services


  • Basic knowledge of the Linux OS
  • Basic knowledge of the Windows OS
  • Basic knowledge of networking

Upcoming Meetings

build and maintain secure networks and systems, protect data and implement vulnerability management programs
Download Full Syllabus

Target Audience

    • Israel
    • Poland
    • USA
    • Russia
    • India
    Skip to content