Check Point

Doing what's right for the customer

Nexum Check Point

There is no upcoming training scheduled right now. Please check back soon.

This Advanced Infrastructure Hacking class is designed for those who wish to push their knowledge. The fast-paced class teaches the audience a wealth of hacking techniques to compromise various operating systems and networking devices. The class will cover advanced penetration techniques to achieve exploitation and will familiarize you with hacking of common operating systems, networking devices and much more. From hacking domain controllers to local root, VLAN hopping to VoIP hacking, we have everything covered.

You will have access to:

  • State-of-the-art hacklab with relevant tools and VMs
  • Dedicated Kali VM to each attendee
  • A hacking lab for 30 days after completion of the course. Scripts and tools are provided during the training, along with student hand-outs.


Who should take this class?
  • System administrators
  • SOC analysts
  • Penetration testers
  • Network engineers
  • Security enthusiasts
  • Anyone who wants to take their skills to the next level


  • Understanding Advanced Hacking techniques for infrastructure devices and systems is critical for penetration testing, red teaming, and managing vulnerabilities in your environment.
  • Students will become familiar with hacking techniques for common operating systems and networking devices.


Day 1
  • IPv4 and IPv6 basics
  • Host discovery and enumeration
  • Advanced OSINT and asset discovery
  • Mastering Metasploit
  • Hacking application and CI servers
  • Hacking third-party applications (Wordpress, Joomla)
  • Hacking databases
  • Windows enumeration and configuration issues
Day 2
  • Windows desktop “Breakout’ and AppLocker bypass techniques (Win 10)
  • Local privilege escalation
  • A/V & AMSI bypass techniques
  • Offensive PowerShell tools and techniques
  • Post-exploitation tips, tools and methodology
  • Active Directory delegation reviews and Pwnage (Win 2012 server)
  • Pass the Hash/Ticket
  • Pivoting, port-forwarding and lateral movement techniques
Day 3
  • Linux vulnerabilities and configuration issues
  • User/service enumeration
  • File share hacks
  • SSH hacks
  • X11 vulnerabilities
  • TTY issues, SSH reverse tunneling
  • Restricted shells breakouts
  • Breaking hardened webservers
  • Local privilege escalation
  • Post-exploitation
Day 4
  • Breaking and abusing Docker
  • Kubernetes vulnerabilities
  • Exploiting insecure VPN configuration
  • VLAN hopping
  • Hacking VoIP
  • B33r 101