Course Summary
This training program provides participants with the expertise required for hands-on IT systems roles. Throughout the course, individuals will learn how to solve complex, multifaceted problems using advanced and diverse security practices. Topics covered include:
Network Security
OS Security
Comprehensive Cybersecurity
Security Tools and Techniques
Common Attacks
Common Defenses
Full System Evaluation
The candidate will learn how to solve complex security tasks based on a given system and scenario. Tools such as tcpdump, Hashcat, nmap, hping3, strings, and other SEC401 or earlier course tools may be used to complete these tasks.
Linux Password Cracking
The candidate will learn how to manipulate a dictionary file and crack passwords in a Linux environment using tools like Hashcat and Aircrack-NG, and gain access to encrypted files using tools such as GPG or GPA.
Malicious Program Execution and Exploitation
The candidate will learn how to evaluate executables using tools like strings and other methods. They will also learn how to use a trojan executable to gain privileged access to another computer, or employ command injection attacks for unauthorized access.
Network Communication Analysis
The candidate will learn how to extract information from data streams (network connections, log files, alerts, etc.) or PCAP files using tools such as tcpdump, Wireshark, and Snort, to access encrypted or hidden information (e.g., GPA/GPG, image steganography, protected files, etc.).
Network Scanning
The candidate will learn how to scan networks for open/closed ports, OS versions, and vulnerabilities. They will also learn to recognize traffic patterns using monitoring tools like tcpdump, which can assist in connecting to hosts, applying minor exploits, or crafting packets with Hping3 to bypass firewalls, spoof IPs and ports, and gather critical information.
Process Hacking
The candidate will learn how to identify vulnerable processes and exploit them to access secure information using tools like Process Hacker.
Windows Password Analysis
The candidate will learn how to recover password hashes from the SAM database and crack passwords in a Windows environment using tools such as Cain and Abel.
Windows System Evaluation
The candidate will learn how to evaluate and exploit vulnerable processes to gain access to secure information. They will also learn how to assess Windows firewall configurations and use PowerShell for advanced Windows administration tasks.
Other Popular Courses
CompTIA: SecurityX
- Duration: 5 Days
- Language: English
- Level: Advanced
- Exam: CAS-005
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Advanced
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 5 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT