What do I think of the Hacking Enterprises 2025 Edition course from In.Security with Will Hunt?

Offensive security courses are everywhere these days, but very few truly deliver a deep, hands-on experience that feels like the real deal. I recently completed the Hacking Enterprises 2025 Edition course from In.Security, led by Will Hunt, and after taking it twice now, I’m excited to share what makes this course stand out.

Personal Experience & Tips

This is easily my top hacking course, and the reason I took it again is simple: knowledge isn’t heavy, and repetition is the mother of learning. The 2025 edition builds impressively on the 2022 release, with fresh content and updated labs that keep you on the cutting edge.

I took this course during Security Fest in Gothenburg, which was an amazing experience in itself the energy, community, and focus on security really added to the learning atmosphere.

If you love password cracking, you’re in for a treat. Will Hunt gets genuinely excited when diving into cracking techniques he’ll talk your ear off and show you everything you need to know. Plus, they even offer a free dedicated password cracking course that complements this training perfectly.

One highlight for me was the CTF platform, which offers extra practice beyond the guided labs and really challenges you to apply what you’ve learned. My tip: don’t rush through the material. Take your time in the labs, experiment with different approaches, and lean on the Discord support the community and consultants there are invaluable when you get stuck.

If you want an ethical hacking course that feels like the real deal, packed with practical exercises and expert guidance, this course is a no-brainer.

Who Shall Take This Course

This course is designed for anyone serious about advancing their offensive security skills in an enterprise context. Whether you’re a:

  • Junior to mid-level penetration tester aiming to deepen your hands-on skills
  • Security professional looking to understand attacker techniques in detail
  • Red teamer wanting to sharpen your exploitation and lateral movement tactics
  • Ethical hacker preparing for real-world enterprise engagements
  • Security enthusiast with a solid foundation eager to step up your game

Keep in mind this isn’t an absolute beginner’s course some prior knowledge of networking, Linux, and Windows internals will definitely help you get the most out of it.

Course Curriculum

The course packs in a wide array of practical offensive techniques:

  • MITRE ATT&CK framework primer
  • Offensive OSINT
  • IPv6 discovery, enumeration, and exploitation
  • Windows and Linux enumeration and living off the land
  • Linux shells, post-exploitation, and privilege escalation
  • Exploitative phishing against simulated enterprise users
  • P@ssw0rd and p@ssphras3 cracking
  • Windows exploitation and privilege escalation
  • C2 infrastructure and beacon deployment
  • Bypassing Windows Defender/AMSI and UAC
  • Active Directory Certificate Services (AD CS) abuse
  • Bypassing AWL (AppLocker, PowerShell CLM, and Group Policy)
  • Situational awareness and domain reconnaissance
  • Pivoting, lateral movement, routing, tunneling, and SOCKS proxies
  • Credential harvesting
  • RDP hijacking
  • Lateral movement for domain trust exploitation
  • MSSQL linked server discovery, execution, and exploitation
  • Azure IMDS exploitation for secret stealing

Benefits

  • 14 days lab access after training finishes
  • 14 days access to a CTF platform with new subnets and hosts
  • Dedicated Discord support with expert security consultants

Thats all!

Keep hacking!

//Roger

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Blog at WordPress.com.

Up ↑