The Art
of Hacking

The Industry Leading Hacking Class for Cyber Security Professionals.

Master the Art of Hacking by building your hands-on skills in a sophisticated hack-lab with material that is delivered on the world conference stage; certified, accredited, continually updated and available globally.

Book the Class
DOWNLOAD The Art of Hacking InfoGraphic

Not just any old hacking Class

The Art of Hacking
The Art of Hacking
Class Overview
The ideal introductory / intermediate training that brings together both Infrastructure Hacking and Web Hacking into a 5-day “Art of Hacking” class designed to teach the fundamentals of what Pen Testing is all about. This hands-on training was written to address the market need around the world for a real hands-on, practical and hack-lab experience that focusses on what is really needed when conducting a Penetration Test. Whilst a variety of tools are used, they are the key tools that should be in any Penetration Tester’s kit bag. This, when combined with a sharp focus on methodology will give you what is necessary to start or formalise your testing career.
This class teaches the attendees a wealth of hacking techniques to compromise the security of various operating systems, networking devices and web application components. The class starts from the very basic, and builds up to the level where attendees can not only use the tools and techniques to hack various components involved in infrastructure and web hacking, but also walk away with a solid understanding of the concepts on which these tools are based. The class comprises of 3 days of infrastructure hacking and 2 days of web hacking.

Infrastructure Basics

  • TCP/IP Basics
  • The Art of Port Scanning
  • Target Enumeration
  • Brute-Forcing
  • Metasploit Basics
  • Password Cracking

Hacking Unix, Databases and Applications

  • Hacking Recent Unix Vulnerabilities
  • Hacking Databases
  • Hacking Application Servers
  • Hacking Third Party Applications (WordPress, Joomla, Drupal)

Hacking Windows

  • Windows Enumeration
  • Hacking Recent Windows
  • Vulnerabilities
  • Hacking Third Party Software (Browser, PDF, Java)
  • Post Exploitation: Dumping Secrets
  • Hacking Windows Domains

Information Gathering, Profiling and Cross-Site Scripting

  • Understanding HTTP protocol
  • Identifying the Attack Surface
  • Username Enumeration
  • Formation Disclosure
  • Issues with SSL/TLS
  • Cross Site Scripting
  • Cross-Site Request Forgery

Injection, Flaws, Files and Hacks

  • SQL Injection
  • XXE Attacks
  • OS Code Injection
  • Local/Remote File include
  • Cryptographic weakness
  • Business Logic Flaws
  • Insecure File Uploads



System Administrators, Web Developers, SOC analysts, Penetration Testers, network engineers, security enthusiasts and anyone who wants to take their skills to the next level.


Students should bring their own laptop, and must have administrative access to perform tasks like install software, disable antivirus etc. Devices that don’t have an Ethernet connection (e.g. MacBook Air, tablets etc.) are not supported.

Also, note that we will use an Ethernet/wired network for this class. If your laptop does not support this, please carry the correct adaptor to ensure you are able to connect to the wired network.

Hack-Lab Preview


Visit Website

QA Training

Visit Website
Frequently asked questions

About the Art of Hacking

What is the “Art of Hacking”?
The Art of Hacking (AoH) is essential training for those entering the world of IT Security and Penetration Testing or for those who wish to consolidate and formalize their knowledge and demonstrate through hands-on work.
Why was Art of Hacking written?
The Art of Hacking was written by professional Penetration Testers and Black Hat Trainers (NotSoSecure) because of the clear need in the market to help people develop not only knowledge, but also hands-on, demonstrable skill. Our coined phrase is; “don’t just tell me, show me.”
How is this of value to my employer and career?
This course is underpinned by a very detailed training structure designed by professional educators and hackers. By taking the course, you will be able to demonstrate that you have been through structured learning process and you can then prove to your employer that you have the formalized foundations of a professional Penetration Tester.
I have already taken other classes; will this e-Learning be of value to me?
We were overwhelmed with inquires at Black Hat about this very topic. The Art of Hacking is all about building core foundations and proving you can demonstrate the required level of skill. You may have taken other types of training in the market.
What is unique about your teaching methodology?
The NotSoSecure founders have been training for a very long time and know what it takes to build a great Pen Tester and Security Professional. Learning about hacking is not about showing hundreds of tools, it’s about creating a framework of knowledge upon which you can build hands-on skill. We teach you the essential tools, syntax, objectives for each stage of testing and how to build you confidence to go it alone.
How does this course compare to SANS and CEH? Why should I consider this?
The course is a unique entry level/intermediate class. It was initially written in 2016 (the class is updated on a regular basis) and talks about a wealth of modern hacking techniques. It teaches how the latest operating systems can be compromised. It covers a vast variety of systems such as databases, application servers, operating systems, networking devices along with a comprehensive 2 days on Web application hacking. Attendees of the class walk away with a wide spectrum of hacking techniques and a good overall understanding on how systems can be compromised. Further, the online lab allows attendees to practice each and every concept hands-on. Unlike most training programs which use an off-the-shelf test bed to demonstrate security vulnerabilities, the Art of Hacking lab has custom built systems in which hacking challenges have been specifically designed to simulate out-of-box thinking and help attendees grasp the concepts inside-out.
Contact the Authors