The Secarma training team regularly run hands-on security training courses across the UK and remotely.

Our courses teach candidates about application and infrastructure security vulnerabilities by stepping them through the process of a penetration test. Our labs allow practical experience breaking security systems, before teaching the candidates how to build systems in a more resilient way.

Who is it for?

Who is it for?

Our security training courses are designed to teach organisations – and individuals with a technical understanding or interest – the tools and techniques we use when engaging in a real world penetration test.

It’s also a useful course for those looking to break into penetration testing and want a first step on their journey.

How can we help?

How can we help?

IT professionals are often tied to strict deadlines and therefore, ensuring everything is secure is sometimes not the first priority. Additionally, many security flaws can be subtle or difficult to spot if you’re not well versed in common vulnerability types and testing methods.

By using the hacker’s point-of-view throughout the training course, we allow those interested in developing a security testing capability to get started on that journey.

Want to know more about how our security training sessions could benefit your organisation? Get in touch with one of our experts today for more info.

What we test

What we test

The process will begin by mapping the attack surface, approaching the work like a real work threat actor, before hunting for vulnerabilities. Once vulnerabilities are discovered we walk through exploitation to demonstrate the real-world risk of issues. We’ll analyse the discovered vulnerability and provide guidance on remediation.

At the end of the day, we’ll review the findings and give guidance on how systems and applications could be hardened. We help candidates make exploitation action more difficult, and attack detection easier.

Mapping and Intelligence Gathering
Before the engagement begins, we’ll map the attack surface to discover alive hosts, services, and versions, as well as mapping application functionality.

Vulnerability Discovery
We’ll demonstrate methods of finding and confirming vulnerabilities and highlight how to minimise false positives.

Proof of Concept and Confirmation
Where vulnerabilities are discovered, a proof of concept exploit will be created to demonstrate the potential business risk. This ensures that false positives are removed by manually confirming and demonstrating all discovered vulnerabilities.

Exploitation
We’ll show you how to discover weaknesses within exposed applications and leverage those weaknesses to demonstrate as much business risk as possible. In other words, you get to step into the shoes of a hacker for the day.

Other services

Hacking & Defending Networks Training

Hacking and Defending Networks

The Secarma testing team regularly run hands-on security training courses across the UK and remotely...

Secarma Cybersecurity Training Course

Hacking and Defending Web Apps

The Secarma testing team regularly run hands-on security training courses across the UK and remotely...