Course Summary

This training program provides participants with the expertise required for hands-on IT systems roles. Throughout the course, individuals will learn how to solve complex, multifaceted problems using advanced and diverse security practices. Topics covered include:

Network Security
OS Security
Comprehensive Cybersecurity
Security Tools and Techniques
Common Attacks
Common Defenses

Full System Evaluation
The candidate will learn how to solve complex security tasks based on a given system and scenario. Tools such as tcpdump, Hashcat, nmap, hping3, strings, and other SEC401 or earlier course tools may be used to complete these tasks.

Linux Password Cracking
The candidate will learn how to manipulate a dictionary file and crack passwords in a Linux environment using tools like Hashcat and Aircrack-NG, and gain access to encrypted files using tools such as GPG or GPA.

Malicious Program Execution and Exploitation
The candidate will learn how to evaluate executables using tools like strings and other methods. They will also learn how to use a trojan executable to gain privileged access to another computer, or employ command injection attacks for unauthorized access.

Network Communication Analysis
The candidate will learn how to extract information from data streams (network connections, log files, alerts, etc.) or PCAP files using tools such as tcpdump, Wireshark, and Snort, to access encrypted or hidden information (e.g., GPA/GPG, image steganography, protected files, etc.).

Network Scanning
The candidate will learn how to scan networks for open/closed ports, OS versions, and vulnerabilities. They will also learn to recognize traffic patterns using monitoring tools like tcpdump, which can assist in connecting to hosts, applying minor exploits, or crafting packets with Hping3 to bypass firewalls, spoof IPs and ports, and gather critical information.

Process Hacking
The candidate will learn how to identify vulnerable processes and exploit them to access secure information using tools like Process Hacker.

Windows Password Analysis
The candidate will learn how to recover password hashes from the SAM database and crack passwords in a Windows environment using tools such as Cain and Abel.

Windows System Evaluation
The candidate will learn how to evaluate and exploit vulnerable processes to gain access to secure information. They will also learn how to assess Windows firewall configurations and use PowerShell for advanced Windows administration tasks.

The following courses or equivalent experiences are prerequisites for this training GIAC Security Essentials (GSEC)

proctored exam Open book, open notes Time limit 4 hour 25 CyberLive - hands-on, real-world practical testing. CyberLive testing creates a lab environment where cyber practitioners prove their knowledge, understanding, and skill using: Actual programs Actual code Virtual machines

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?