Live Training starts on 24 August
Intro & Prerequisites – Hands-on Hacking™
Hacker House Hands-On Hacking course is an intensive introductory course that teaches applied hacking methodologies in a hands-on practical orientated approach. Our course is engineered from decades of experienced cyber security practitioner’s knowledge to educate students on common cyber security tasks. Our course is delivered by expert hackers to prepare students on adversarial thinking and equip them for tasks conducted in a number of different cyber security roles. Our team is dedicated to ensuring that each student is adequately prepared and capable of performing several applied hacking concepts to real- world problems. We teach the theoretical concepts required for each assessment activity, provide instructor led demonstrations and then hands-on practical labs to be completed. Our course lab contents and modules are downloadable and can be re-used by students to continue learning beyond the course.
Our labs are provided as an educational resource to further enhance student learning and as a reference material for on-the-task assessment activities in future. We teach you how to hack into computers so you can better defend against and understand the methodologies used by hackers to breach systems.
We teach students from a grounds-up approach meaning you are not necessarily an expert in the technology field. Our students have come from all manner of technical environments or are currently attempting to enter industries in technical job roles. We however do require that students can demonstrate technical proficiency and are comfortable with computing tasks. To benefit the most from our course as a student you should be comfortable with the following topics:
- Basic TCP/IP networking
- Comfortable using Linux and performing general computer administration tasks
- Knowledge of programming languages are an advantage but not essential
As this is an introductory course designed for training people into junior and mid-level positions in the cyber security field, you should be competent with configuring your computers network interfaces and doing routine administration tasks beforehand.
If you do not understand basic concepts of computers and networking such as “what is an IP address”, “how to list files and processes” or “what is a firewall” then it is advised to take a course in Linux fundamentals and TCP/IP networking before approaching our course. If you can answer the example questions above then this course is likely suitable for you. Typical students attending our course are working in or towards jobs within IT and technology realms.
You hardware that meets the following recommended minimum technical specifications to complete our course:
- 2 or more CPU cores (Intel i3 & above recommended)
- At least 2-4gb of RAM
- Approximately 40-50gb free hard disk space (you may be ok with less)
- Virtual Box (https://www.VirtualBox.org)
You can try a sample of our practical components to assess your suitability before buying the course. This module is intended to be challenging to our students and so do not be worried if you do not complete all of the module, it is intended as a guide to show you what the course is about.
We teach how to conduct network and application security assessments from a real-world scenario driven hacker’s approach. Students who complete our course leave with a core competency of skills that are applicable to many cyber security roles. Students will have performed a number of practical hands-on assessment activities covering different network perspectives and aimed at understanding the how’s and why’s of how breaches occur. Students completing this course will leave with an understanding of performing the following assessment activities:
- Open-source Intelligence Review
- External Infrastructure Assessments
- Internal Infrastructure Assessments
- Web Application Assessments
- Perform a Penetration Test
Our course will leave students with a clear understanding of the fundamentals in performing security assurance exercises against a range of technologies. This can help assist you with deploying secure platforms, assessing company infrastructure for weaknesses and defending assets such as databases or servers.
Hacker House completely understands that stuff happens; life happens; and sometimes we need to cancel. You may cancel up to two weeks before the launch date of April 19th 2019 and we can give you a full refund (minus ticketing charges). If you cancel on us last minute it is a bit trickier; we are a small team and we will not be able to guarantee a refund at that point. We are not able to process any refunds for the pre-sale of Hands on Hacking course beyond April 4th 2019. If price is an issue for you, please write us directly and explain your situation; we want to work with as many interested and capable students as we can. We work hard to ensure the quality of our courses and want to do all that we can to give you the maximum content, in a pleasant learning environment to help you reach your potential at the end of our training. Once you purchase access to the course you are provided electronic access to the materials for 12 months from the date of initial sign-on.
Hacker House training: What is it and who is it for?
If you’ve ever wondered why there are so many unfilled jobs in cyber security, why Information Security roles pay such high salaries, and why cyber-attacks are getting worse and more prevalent, we have the answer:
There are too few highly trained, capable and confident cyber security professionals in the workplace, largely due to inadequate traditional information security training, which is:
- Often Outdated, based on reference material that’s over 10 years old in some cases
- Prohibitively expensive, making it inaccessible for many students and nonviable for companies to scale security teams
- Impractical. It’s inconvenient for businesses to lose key staff for a week of off-site training (not to mention expensive), and inconvenient for students
- Theory-heavy, dry and too corporate. It fails to attract the raw cyber talent who tend to thrive in the ‘doing’ of cyber security.
Hands-On-Hacking as the solution
Hacker House created a solution to bridge the skills gap in cyber security; Hands-On-Hacking. This 12-module course, delivered both online and via intensive in-person classes, gives IT students and existing InfoSec professionals cutting-edge cyber security skills by approaching cyber security in a new practical orientated way.
Why take Hands-On-Hacking?
- Learn attack and mitigation techniques. Students learn the exact same attack techniques that malicious hackers are using right now, so that they can build better cyber security defences for their employer
- Purple teaming skills. Students learn how to think like their attacker improving their skills for blue team and defender roles as they learn how the adversary thinks and behaves.
- Practical, hands-on-training with a focus on real-life situations. Real learning happens through practice. Whilst students will cover essential theory, the focus of Hands-On-Hacking is to engage students by having them solve real problems in sand boxed virtual environments, and have fun through CTF competitions.
- Economical and scales. We believe in breaking down barriers to entry in the Information Security industry, that’s why our online training is one of the most affordable on the market
- Convenient. Our online training can be taken on student or staff’s own computers, and completed in their own time
- Continued learning and support: students get access to the course for 12 months and join our exclusive online student forum
- Taught by world-renowned cyber security and ethical hacking expert, Matthew Hickey. Hands-On-Hacking was built by ethical hackers for ethical hackers. We know what makes you tick, how you like to learn, and what assistance you may need to apply your skills in industry.
Who is Hands-On-Hacking for?
Hands-On-Hacking is ideal for existing industry professionals as well as IT students with an aptitude for, but not necessarily experience in ethical hacking.
Information Security Professionals
Unlike the traditional IT paradigm, which divides IT professionals into blue or red teams, Hands-On-Hacking gives professionals the skills used by attackers allowing them to perform both; in other words, purple teaming skills. With Hands-on-Hacking, professionals learn how attackers are targeting systems, giving them a unique perspective for system defence:
- anticipate attacks
- patch vulnerabilities before they are exposed, and
- catch, contain, and patch breaches swiftly
In this way, companies are able to reduce their reliance on external penetration testing by at least 90%, and benefit from having internal staff who are highly versed in effective practical cyber security. Purple teaming skills are in high demand and extremely short supply – there are very few training platforms which offer to develop skills to the extent of Hands-On-Hacking. Professionals that complete Hands-On-Hacking will not only find themselves more effective at what they do and able to offer, but also command higher salary.
At Hacker House, we champion talent, regardless of background or education. Hacker House has spent years working with talented hackers, many of whom do not have a GCSE to their name, let alone a degree. We also know that many talented hackers struggle with knowing how to articulate their skills and enter the workplace. At Hands-On-Hacking Live, we will help you with both. Not only will students learn industry-leading ethical hacking skills from Matthew Hickey, if you are based in the UK you will also be eligible to enter into a work placement scheme which we have organised with DCMS. If you have a talent for cyber security, IT or hacking, this course is for you.
If you have a talent for cyber security, IT or hacking, this course is for you.
To find out about more about our online training, click here.
Occasionally, we also offer intensive, in-class training where students benefit from in-person mentoring from Matthew and the Hacker House team. To find out about our next forthcoming in-class training, click here,