Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Focal Point - Hacker Methodologies Security Professional

New – Hacker Methodologies for Security Professionals teaches you the processes threat actors use to break into organizations’ networks and steal their most sensitive data. Utilizing industry-standard penetration testing and auditing software, you will learn to identify, scan, and enumerate target systems; correlate services to vulnerabilities and exploits; employ exploits to gain access to the target systems; elevate privileges; propagate through the network; and cover their tracks within a target network. This course is focused primarily on Linux and Windows operating systems, so students should be comfortable with both.

GK# 100223

Course Overview

TOP

Learn the processes threat actors use to break into organizations’ networks and steal their most sensitive data.

 

Learn more about this topic. View the recorded webinar From Analyst to Threat Hunter.

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

Class is Full
This session is full. Please select a different session.

What You'll Learn

TOP

After successfully completing this course, students will be able to:

  • Identify the classes of hackers, their motivations, and the methodologies employed by threat actors
  • Use publicly available tools and open source intelligence techniques to develop a target footprint
  • Scan and enumerate targets to identify underlying operating systems and service
  • Research and leverage exploits for vulnerable services to achieve access to target systems
  • Identify system configuration weaknesses and viable privilege escalation tactics
  • Analyze exploited systems to identify and remove indicators of compromise
  • Employ system tools to exploit additional targets within an internal system

For the Capstone Exercise, learners will be required to:

  • Establish initial access to a DMZ
  • Pivot to other network segments
  • Retrieve requested information

Prerequisites

TOP
  • Familiarity with Windows or Linux command-line interfaces
  • Knowledge of TCP/IP networking

Who Should Attend

TOP
  • Threat operations analysts seeking a better understanding of network intrusions
  • All network administrators needing a better understanding of network security
  • Incident responders who need to quickly address a system security breach
  • Forensic investigators who need to identify malicious network attacks
Course Delivery

This course is available in the following formats:

Virtual Classroom Live

Experience expert-led online training from the convenience of your home, office or anywhere with an internet connection.

Duration: 5 day

Classroom Live

Receive face-to-face instruction at one of our training center locations.

Duration: 5 day

Request this course in a different delivery format.
Enroll