Cyber Infrastructure Attacks


5 Days

Download Full Syllabus Request a Quote
All Our Courses Now Also LIVE

Course Outline

In this course, you will take your first steps in Cyber Security! The lessons will guide you through the initial stage of an attack, in which information is gathered, and then you will learn how to make your way into the organization. You will be introduced to network data analysis, and how to make sure you are not discovered when involved in offensive cyber activity. This course features hands-on simulations provided by @Cywar – a gamified training and assessment platform by HackerU Solutions.

Upcoming Meetings


  • Wireshark usage
  • Capture data on a network
  • Analyzing data using Wireshark
Footprinting and reconnaissance
  • Search engines
  • People search
  • Google Hacking DB
  • Website footprinting
  • Information gathering
Network Scan
  • Network layout & Services
  • TCP & UDP handshake
  • Port scan
  • IDLE scan
  • Firewall & IDS evasion
  • Automation scan
Password cracking
  • Attack types
  • Hash types
  • Local cracking
  • Remote Cracking
Wi-Fi Attack
  • Wi-Fi encryption
  • EAPOL protocol
  • Automated Frameworks
  • Data snif
  • Rouge Access Point
Men In The Middle
  • MITM Technique
  • Arp spoof
  • DNS spoof
  • Bypassing SSL
  • MITM Automated Frameworks
Hacking Frameworks & Automation
  • Terminology
  • Search Engines
  • Automated Framework
  • Creating malicious files
Anonymity on the network
  • Proxy
  • VPN
  • Proxy chain
  • TOR


  • Basic knowledge of the Linux OS.
  • Basic knowledge of the Windows OS
  • Basic knowledge of networking

Upcoming Meetings

Perform online and offline brute-force attacks against targets twithout leaving any footprints”
Download Full Syllabus

Target Audience

    • Israel
    • Poland
    • USA
    • Russia
    • India
    Skip to content