Infrastructure Hacking Check Point Certified Pen Testing Expert


Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.


I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.

Upcoming Dates

Sep 19 - Sep 20, 2022
09:00 - 17:00

Oct 17 - Oct 18, 2022
09:00 - 17:00

Nov 14 - Nov 15, 2022
09:00 - 17:00

Dec 12 - Dec 13, 2022
09:00 - 17:00

Jan 9 - Jan 10, 2023
09:00 - 17:00

Feb 6 - Feb 7, 2023
09:00 - 17:00

Infrastructure Hacking Check Point Certified Pen Testing Expert
2 days  (Instructor Led Online)  |  Check Point Courses

Course Details

The Infrastructure Hacking Check Point Certified Pen Testing Expert course is an intermediate training designed to teach the fundamentals of what pen testing is all about. This hands-on training was written to address the market need around the world for a real hands-on, practical and hack-lab experience that focuses on what is really needed when conducting a penetration test. Whilst a variety of tools are used, they are the key tools that should be in any penetration tester’s kit bag. This, when combined with a sharp focus on methodology will give you what is necessary to start or formalise your testing career.


See other Check Point courses


This curriculum familiarizes you with hacking tools and techniques.

  • Gain practical experience with tools that will serve you in the future
  • Learn tools and techniques to hack various components involved in infrastructure hacking
  • Develop a critical understanding of the concepts behind these


Day 1

  • TCP/IP basics
  • The threat of port scanning
  • Target enumeration
  • Brute-forcing
  • Meta sploit basics
  • Hacking recent Unix vulnerabilities
  • Hacking databases
  • Hacking application servers
  • Password cracking

Day 2

  • Hacking third-party applications (WordPress, Joomla, Drupal)
  • Windows enumeration
  • Hacking recent Windows vulnerabilities
  • Hacking third-party software (Browser, PDF, Java)
  • Post-exploitation: dumping secrets
  • Hacking windows domains

Target Audience

  • System administrators
  • SOC analysts
  • Penetration testers
  • Network engineers
  • Security enthusiasts
  • Anyone who wants to take their skills to the next-level


Before attending the Infrastructure Hacking Check Point Certified PenTesting Expert course, you must bring or have access to a laptop with admin/root access.