Skip to content
This is the project page for our training services:
Most, if not all of our work is within the domain of open source*. We use open source software and tools, or techniques based upon it. We therefore offer training to work with open source and our courses are very much “hands-on” and fun!
Our current courses are:
Windows to Linux (Local Area Network Pen testing). – This course developed a question from the London Fire Brigade and Rescue service. Their ask was, is there an open source tool set for baseline vulnearblity testing on networks, From this we built a 45 minute presentation and subsequent two and a half hour course. The outcomes are that sudents build their own Linux laptop and install the tools necesary to scan their networks, as well as learn how to maintain their Linux distro.
Windows to Linux (Web sites and Web Apps). – This course is a follow on from the one above and takes around two and a half hours. We cover some command line and GUI tools to enable the participatns to review their organisations websites and web apps both live and in test mode, without causing harm or overload.
Windows to Kali Linux (Pen testing). – This course builds form the above two. We train attendees to convert a Windows laptop to a Kali Linux laptop. The training covers updating the operating system and apps, an introduction to the command line and GUI testing tools. Kali Linux is an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments. This popular course is ideal for IT/Cybersecurity leads for ad-hoc testing and for those wishing to do regular internal and external testing of their networks and websites. More on Kali Linux can be found here: https://www.kali.org/ – There are some follow on options for the Kali workshop, these are:
Vulnerability Scanning: with OpenVAS (Pen testing) – A half day course building upon Windows to Kali Linux course. We install OpenVAS to augment the standard Kali build. This course covers the install and setup of an open source vulnerability scanner, which is great on networks (internal and external) as well as websites and other digital assets. The outcome enables clear and updateable, regular, repeatable scans of your cyber infrastructure. The course covers, the setup of the OpenVAS system, initial scans and a review of results. It can also include a cutdown version of the Windows to Kali Linux course or, could be run as a second day in addition to the Windows to Kali Linux course. More on OpenVAS can be found here http://www.openvas.org/
WiFi: A Half day workshop based testing your in-house WiFi, using attack and defense (red and blue) team techniques. This interactive workshop is best run on premises, and builds upon #TechTALK lectures at a number of WARP forums.
Phishing: build an in-house tool – Half day course based on open source tools. This course enables participants to run their own phishing campaigns. Attendees will learn to run full phishing campaigns, or conduct small-scale in-house tests, using open source tools prior to the purchase of more expensive bespoke commercial software. This course covers the install and maintenance of open source phishing tools and techniques. In addition to the setting up of a phishing campaign, we cover the analysis of the outcomes based around the developed of our own click ME not phishing tool. This course is delivered to a maximum of two people for technical reasons.
LoRaWAN: A Half day workshop introductury guide to what it is, what it does, how it works and some baseline security concepts, again based on #TechTALK lectures at a number of WARP forums.
Pricing and some context: All courses are for up to six candidates (unless otherwise specified) and are one day in length. Cost is from £475 per day or £275 per half day (both ex VAT) plus expenses and travel/hotels as necessary.
All course are based on Debian based Linux distributions, typically using Ubuntu, Kali or Mint, and use 64-bit platforms. An exception is the phishing course can be run on Amazon (AWS), indeed this is our recommendation. Students should be confident computer users, baseline requirements for each course, as well as more information on course content, are available upon request.
*Open source, denoting software for which the original source code is made freely available and may be redistributed and modified.
Need to know more? Please click here.
Developed during 2018-20, new courses may be made available – Works mainly by @cryptomoose – words by @waoaoms