Training

This is the project page for:
Our training services – most, if not all of our work is within the domain of open source*. We use open source software and tools, or techniques based upon it. As such we now offer training to work with open source, our courses are very much “hands-on” and fun!
Our current courses are:
Windows to Kali Linux (Pen testing). – We train attendees how to convert a Windows laptop to a Kali Linux laptop. The training covers updating the operating system and apps, an introduction to the command line and GUI testing tools. Kali Linux is an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.
This course is ideal for IT/Cybersecurity leads for ad-hoc testing and for those wishing to do regular internal and external testing of their networks and websites. More on Kali Linux can be found here: https://www.kali.org/
Vulnerability Scanning: with OpenVAS (Pen testing) – Building upon Windows to Kali Linux course, we install OpenVAS to augment the standard Kali build.  This course covers the install and setup of an open source vulnerability scanner, which is great on networks (internal and external) as well as websites and other digital assets.  The outcome would enable clear and updateable, regular, repeatable scans of your cyber infrastructure.
The course covers, the setup of the OpenVAS system, initial scans and a review of results. It can also include a cutdown version of the Windows to Kali Linux course or, could be run as a second day in addition to the Windows to Kali Linux course. More on OpenVAS can be found here  http://www.openvas.org/
Phishing: build an in-house tool – Based on open source tools, this course enables participants to run their own phishing campaigns. Attendees will learn to run full phishing campaigns, or conduct small-scale in-house tests, using open source tools prior to the purchase of more expensive bespoke commercial software.
This course covers the install and maintenance of open source phishing tools and techniques. In addition to the setting up of a phishing campaign, we cover the analysis of the outcomes based around the developed of our own click ME not phishing tool (this course is delivered to a maximum of two people for technical reasons).
Pricing and some context: All courses are for up to six candidates (unless otherwise specified) and are one day in length. They are run on a cost recovery basis of around £675 (ex VAT) with public sector discounts available.
All course are based on Debian based Linux distributions, typically using Ubuntu, Kali or Mint, and use 64-bit platforms. An exception is the phishing course can be run on Amazon (AWS), indeed this is our recommendation.  Students should be confident computer users, baseline requirements for each course, as well as more information on course content, are available upon request.
*Open source, denoting software for which the original source code is made freely available and may be redistributed and modified.
Need to know more? Please click here.
Developed during 2018, new courses may be made available – Works mainly by @cryptomoose – words by @waoaoms

SaveSave

SaveSave

SaveSave