© 2020 Content Security Pty Ltd.


Security Training:

To beat a hacker, you need to think like a hacker. This course is ideal those who’d like to understand how cyber criminals view your organisational environment.

Ideal for Chief Information Security Officer, Security Architect or a DevOps developer, this course will you in finding out about the types of tools hackers are likely to use to infiltrate their business network.

Do you need to analyse penetration forensic tests to quickly discern the difference between critical and non-critical threats so you are better informed to take the right protective measures faster?

If so, our unique hands-on, hacking security training will benefit you greatly.

Content Security offers a unique hands-on introduction to penetration testing and how to be on the offensive when it comes to the security of your organisation. This course is 80% practical and you will perform actual hacking on a virtual company, Sarif Labs, created specifically for this course.

The course is a role-playing game where you take on the persona of a hacker who is recruited by a hacking group called ‘Impact 016’. As you learn more techniques, you will progress through the storyline and gain access to more systems, which in turn opens up more of the storyline.

What you will learn

While we will cover a wide range of security topics, it is not designed to teach everything. The aim is to provide you with enough baseline knowledge so you can continue learning more about ethical hacking.

The following topics are covered:

  • Information Gathering
  • Exploits & Buffer Overflows
  • Local Privilege Escalation
  • Password Attacks
  • Client Side Attacks
  • Pivoting & Tunneling
  • Web Application Attacks
  • Domain Privilege Escalation
  • Wireless Attacks

Training is hands-on where you learn the initial information and then put it to use in a simulated target network.

Why Content Security?

Our team are seasoned, experienced and business-minded security consultants with an average of 10 years experience having conducted hundreds of training programs for organisations large and small.

For more information please contact our cybersecurity professionals today.