Login     Signup
   info@zetlantechnologies.com        +91-8680961847

  >   Checkpoint Certification   >   CCPE-AIH - Certification

Advanced Infrastructure Hacking (AIH)

Course: 40 IGS | 4000 USD

Exam: 2.5 IGS | 250 USD #156-409


Course Description


Understanding Advanced Hacking techniques for infrastructure devices and systems is critical for penetration testing, red teaming, and managing vulnerabilities in your environment.


Course Details


Learn How to

  • Gain practical experience with tools that will serve you in the future
  • Learn core infrastructure techniques
  • Go forward into more advanced infrastructure topics

How you will Benefit

  • Students will become familiar with hacking techniques for common operating systems and networking devices.
Course Details

1. IPv4/IPv6 Scanning And Open-Source Intelligence Gathering (OSINT)

  • IPv6 service discovery and enumeration
  • Exploiting systems/services over IPv6
  • Host discovery and enumeration
  • Advanced OSINT and asset discovery
  • Exploiting DVCS and CI-CD server

  • PostgreSQL / MySQL
  • Oracle

  • Windows enumeration and configuration Issues
  • Windows desktop breakout and AppLocker bypass techniques (Win 10)
  • Local privilege escalation
  • Windows Antivirus
  • Offensive PowerShell /Offsec Development
  • AMSI bypass Techniques
  • AV Evasion Techniques
  • Post-exploitation Tips, Tools, and Methodology

  • Active Directory delegation reviews and pwnage (Win 2016 Server)
  • Pass the hash/ticket
  • Cross domain and forest attacks
  • Pivoting, port forwarding, and lateral movement techniques
  • Persistence and backdooring techniques (Golden and Diamond Ticket)
  • Command and Control (C2) frameworks

  • Linux vulnerabilities and configuration issues
  • Treasure hunting via enumeration
  • File share/SSH Hacks
  • X11 Vulnerabilities
  • Restricted shells breakouts
  • Breaking hardened web servers
  • Local privilege escalation
  • MongoDB exploitation
  • TTY “Teletype” hacks and pivoting
  • Gaining root access via misconfigurations
  • Kernel exploitation
  • Post exploitation
  • Persistence techniques
  • Kerberos authentication
  • Breaking and abusing Docker
  • Exploiting Kubernetes vulnerabilities
  • Breaking out of Kubernetes containers

  • AWS, MS Azure, and GCP specific attacks
  • Storage misconfigurations
  • Credentials, APIs, and token abuse
  • Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), Container as a Service (CaaS), and serverless exploitation
  • Azure AD attacks
  • Exploiting insecure VPN configuration
  • VLAN hopping attacks


Fees Structure : 22500 INR / 270 USD
Total No of Class : 44 Video Class
Class Duration : 38:30 Working Hours
Download Feature : Download Avalable
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Brochure       Buy Now       Sample Demo

Fees Structure : 30500 INR / 365 USD
Class Duration : 60 Days
Class Recording : Live Class Recording available
Class Time : Monday to Firday 1.5 hours per day / Weekend 3 Hours per day
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Download Brochure       Pay Online