Network Penetration Testing

Date: TBA

Time: 9.00am – 5.00pm

Duration: 9 Days

Course Overview

Organisations are investing in cybersecurity solutions and strategy. However, the only way to ensure these are functional is by testing them. Therefore, skillful pen-testers who can simulate attacks and determine ways to infiltrate the network undetected are needed.

In this module, participants will learn about the cyber kill chain and practice using it through a series of steps and components.

Participants will analyse case studies and, most importantly, understand the attacker’s mindset and way of thinking. An analyst who can think like an attacker can better identify possible weaknesses, spot anomalies, define alerts and understand the attacker’s behavior during investigation.

This module is part of Higher Certificate of Cyber Security (Advanced).

Learning Outcomes

With a good understanding of the attacker’s mindset and the possible actions the attacker might take, cybersecurity analysts will be better equipped to identify the actions taken by the attacker during an investigation and more quickly locate the attacker’s assets.

This course will teach the learner to be an active member of the red team and look for vulnerabilities in the network.

The course will teach learners on:

  • Mastering the network kill chain
  • Obtaining a deep understanding of each of the attacker’s steps
  • Gaining practical experience in attack tools and techniques
  • Obtaining familiarity with case studies
  • Understanding the attacker’s mindset


  • Cyber kill-chain
  • External reconnaissance
  • Initial compromise (credentials, hashes, client-side exploits)
  • Initial reconnaissance
  • Initial foothold (privilege escalation, persistence)
  • Lateral movements (fingerprinting, pivoting)
  • Establish foothold (command and control, multi-staging)
  • Network/endpoint evasion
  • Protocol vulnerabilities

Who Should Attend

  • Cyber Security Analyst
  • Red Team members


  • Python programming experience
  • Networking experience
  • Operating system experience

Course Conveners

(Click their photos to view their short biographies)

eeeee Dvir Chikvashvili

Mr Dvir CHIKVASHVILIMr Dvir Chikvashvili

eeeee Gur Sharon

Mr Gur SHARONMr Gur Sharon

eeeee Rony Munitz

Mr Rony MUNITZMr Rony Munitz

eeeee Ron Suhodrev

Mr Ron SuhodrevMr Ron Suhodrev

eeeee Zhuang Weiliang

Mr ZHUANG WeiliangMr Zhuang Weiliang

Insight from Instructor

“A talented pen tester could simulate a potential attacker and find possible threats, holes and security breaches. Thanks to the pen testers work, the security team could cover those breaches and better protect the network.

This course will cover the entire cyber kill-chain, the students will gain hands on experience with the different parts of an attack and will practice the attacker’s mind set.

With the technical skills and with the attacker’s thinking and point of view, the analysts could better assess the network and find security threats real attackers might use.”

Ron Scuhodrev

Course Fees

Singapore Citizens
39 years old or younger
40 years old or older
Singapore PRs
Enhanced Training Support for SMEs
International Participants

Total Nett Programme Fee Payable, Including GST, after additional funding from the various funding schemes

Participants must fulfill at least 75% attendance and pass all assessment components to be eligible for SSG funding.

To enquire, email

To register, click Register

Course Code:
TGS-2020503220 (Synchronous e-learning)

Select Short Course / Modular Course -> Apply for Myself -> Browse Academic Modules / Short Courses-> Module/Course Category -> Short Courses -> Browse Courses-> Advanced Computing for Exe (Faculty/Department / Unit)

Please download the user guide for NUS Online Application Portal after you click ‘Apply for Myself’ if you need assistance.

Course Fee Breakdown

Singapore Citizens

Singapore Citizens

39 years old or younger

Singapore Citizen

40 years old or older
Singapore PRs
Enhanced Training Support for SMEs
International Participants

You may also like to view: