Course Summary

This training program provides participants with the expertise required for hands-on IT systems roles. Throughout the course, individuals will learn how to solve complex, multifaceted problems using advanced and diverse security practices. Topics covered include:

Network Security
OS Security
Comprehensive Cybersecurity
Security Tools and Techniques
Common Attacks
Common Defenses

Full System Evaluation
The candidate will be able to solve a complex security related task based on a system and scenario presented to them. Some tools to consider completing these objectives would be tcpdump, Hashcat, nmap, hping3, strings, and any other SEC401 or earlier course tools.
Linux Password Cracking
The candidate will be able to manipulate a dictionary file and crack passwords in a Linux environment using tools such as Hashcat and Aircrack-NG to access secure information from encrypted files using GPG or GPA.
Malicious Program Execution and Exploitation
The candidate will be able to evaluate executables using the strings tool and other methods, use a trojan executable to gain privileged access to another computer and perform a task, or utilize a command injection attack to gain privileged access
Network Communication Analysis
The candidate will be able to extract information from a datastream (network connection, log files, alerts, etc…) or Pcap using tools such as tcpdump, Wireshark, Snort, etc… to access secure information from encrypted sources (GPA (GPG), Image Steganography, protected files, etc…).
Network Scanning
The candidate will be able to scan a network to find open and closed ports, OS versions, and various vulnerabilities. The candidate should be able to recognize this traffic in a traffic monitoring application such as tcpdump. This information could be used to connect to a host, apply a minor exploit, or craft packets using Hping3 to bypass firewalls, spoof IP and/or Port to gain information.
Process Hacking
The candidate will be able to evaluate vulnerable processes and exploit them to gain access to secure information using the Process Hacker tool.
Windows Password Analysis
The candidate will be able to recover hashes from the SAM database and crack passwords in a Windows environment using the Cain and Abel tool.
Windows System Evaluation
The candidate will be able to evaluate vulnerable processes and exploit them to gain access to secure information. Evaluate Windows firewall configurations and use Powershell to perform complex Windows administration tasks.

The following are courses or equivalent experiences that are prerequisites for GX-IH: GIAC Security Essentials (GSEC) Exam code SEC401

proctored exam Open book, open notes Time limit 4 hour 25 CyberLive - hands-on, real-world practical testing. CyberLive testing creates a lab environment where cyber practitioners prove their knowledge, understanding, and skill using: Actual programs Actual code Virtual machines

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?