Hacking by Numbers:
Bootcamp Edition

Sensepost july 21-22 july 23-24


Ends February 1


Ends June 1


Ends July 20


July 21-24


Reality, Theory and Practice! This course is the "How did they do that?" of modern hacking attacks. From start to finish we will lead you through the full compromise of a company's IT systems, explaining the tools and technologies, but especially the thinking, strategies and the methodologies for every step along the way. "Hacking By Numbers – Bootcamp Edition" will give you a complete and practical window into the methods and thinking of hackers.

Topics include:


SensePost will provide fully configured laptop computers as well as CDs with all the tools and materials used in the course. Students need to ensure they have the necessary level of skill. No hacking experience is required for this course, but a solid technical grounding is an absolute must. Students are expected to be versed in basic programming or scripting, networking and Internet technologies, 'nix and Windows operating systems, basic SQL and database technologies. No advanced skills are required, but students without a good, practical knowledge of these areas will fall behind in this fast-paced class. Students without the requisite technical skills are encouraged to consider 'Cadet Edition'. Cadet and Bootcamp Edition can be taken back-to-back.


'Bootcamp' is SensePost's 'introduction to hacking' course. It is strongly method based and emphasizes structure, approach and thinking over tools and tricks. The course is popular with beginners, who gain their first view into the world of hacking, and experts, who appreciate the sound, structured approach.

Cadet and Bootcamp Edition can be taken back-to-back. There is a small amount of overlap between the courses but they have been carefully designed to provide a congruent learning experience.

Students who have mastered the Bootcamp Edition will be perfectly prepared to move on the 'BlackOps' Edition to sharpen their skills in real hacking scenarios.

Who should attend

Information security officers, system and network administrators, security consultants, government agencies and other nice people will all benefit from the valuable insights provided by this class.

What to bring

Just Yourself. All necessary equipment will be provided, including pre-configured laptops, tools and utilities.

Free additional tools workshop

After the first day of the course SensePost offers a free additional workshop on using their suite of hacking tools, including Wikto, Aura, Suru, Crowbar, BidiBLAH and others, copies of which will be distributed to all students. The tools workshop is open to all attendees of any SensePost course and run in the evening after training. Precise times and locations will be announced during the training courses.

Course Length

Two days. All course materials, lunch and two coffee breaks will be provided. A Certificate of Completion will be offered.

Course Developer

Dominic White is currently a Senior Security Consultant working for SensePost. He was previously a manager in the Deloitte Security & Privacy group in South Africa. Previously, Dominic graduated from Rhodes University with a Master's degree in Computer Science, specialising in information security. Dominic has given SensePost training at Black Hat 2010, and was one of the creators of the unplugged course.

Course Trainers

SensePost is an independent and objective organisation specialising in information security consulting, training, security assessment services and IT Vulnerability Management. SensePost is about security. Specifically - information security. Even more specifically - measuring information security. We've made it our mission to develop a set of competencies and services that deliver our customers with insight into the security posture of their information and information systems.

Charl van der Walt is a founding member and managing director of SensePost, a leading international information security services provider. Pretoria-based Charl regularly presents courses and lectures for companies, conferences and universities around the world. He is frequently published and has co-authored four books on information security and computer hacking.