SEC560 is the must-have course for every well-rounded security professional. With comprehensive coverage of tools, techniques, and methodologies for network penetration testing, SEC560 truly prepares you to conduct high-value penetration testing projects step by step and end to end. Every organisation needs a skilled information security personnel who can find vulnerabilities and mitigate their effects, and this entire course is specially designed to get you ready for that role. Starting with proper planning, scoping and recon, the course will then dive deep into scanning, target exploitation, password attacks, and web app manipulation with over 30 detailed hands-on labs throughout. At the same time, take home chock full of first-hand tips from some of the world's best penetration testers to help you do your job safely, efficiently, and with great skill.

Learning Outcome

Participants will be able to: 

  • Learn how to perform detailed reconnaissance
  • Study a target's infrastructure by mining blogs, search engines, social networking sites, and other Internet and intranet infrastructures
  • Be equip with skills to scan target networks using best-of-breed tools at our hands-on labs 
  • In-depth understanding of run-of-the-mill options and configurations
  • Learn about capabilities of the best pen test toolsets 
  • Gain knowledge on methods for exploiting target systems to gain access and measure real business risk 
  • Dive deep into post-exploitation, password attacks and web apps
  • Pivot through target environment to model attacks of real-world bad guys, emphasising the importance of defence

Who should Attend?

  • Security personnel whose job involves assessing networks and systems to find and remediate vulnerabilities
  • Penetration testers
  • Ethical hackers
  • Defenders who want to better understand offensive methodologies, tools, and techniques
  • Auditors who need to build deeper technical skills
  • Red Team members
  • Blue Team members
  • Forensics specialists who want to better understand offensive tactics

Eligibility Criteria

Attendees are expected to have:

  • Working knowledge of TCP/IP
  • Understand the differences between cryptographic routines such as DES, AES, and MD5
  • Basic knowledge of the Windows and Linux command lines

*While SEC560 is technically in-depth, it is important to note that programming knowledge is NOT required for the course.


This course is endorsed under Critical Infocomm Technology Resource Programme Plus (CITREP+) Programme.
To find out more about CITREP+ Funding, please refer to Programme Support under CITREP+ page

Information is accurate as of 9 Jan 2020