Course Summary
This training program provides participants with the expertise required for hands-on IT systems roles. Throughout the course, individuals will learn how to solve complex, multifaceted problems using advanced and diverse security practices. Topics covered include:
Network Security
OS Security
Comprehensive Cybersecurity
Security Tools and Techniques
Common Attacks
Common Defenses
Full System Evaluation
The candidate will be able to solve a complex security related task based on a system and scenario presented to them. Some tools to consider completing these objectives would be tcpdump, Hashcat, nmap, hping3, strings, and any other SEC401 or earlier course tools.
Linux Password Cracking
The candidate will be able to manipulate a dictionary file and crack passwords in a Linux environment using tools such as Hashcat and Aircrack-NG to access secure information from encrypted files using GPG or GPA.
Malicious Program Execution and Exploitation
The candidate will be able to evaluate executables using the strings tool and other methods, use a trojan executable to gain privileged access to another computer and perform a task, or utilize a command injection attack to gain privileged access
Network Communication Analysis
The candidate will be able to extract information from a datastream (network connection, log files, alerts, etc…) or Pcap using tools such as tcpdump, Wireshark, Snort, etc… to access secure information from encrypted sources (GPA (GPG), Image Steganography, protected files, etc…).
Network Scanning
The candidate will be able to scan a network to find open and closed ports, OS versions, and various vulnerabilities. The candidate should be able to recognize this traffic in a traffic monitoring application such as tcpdump. This information could be used to connect to a host, apply a minor exploit, or craft packets using Hping3 to bypass firewalls, spoof IP and/or Port to gain information.
Process Hacking
The candidate will be able to evaluate vulnerable processes and exploit them to gain access to secure information using the Process Hacker tool.
Windows Password Analysis
The candidate will be able to recover hashes from the SAM database and crack passwords in a Windows environment using the Cain and Abel tool.
Windows System Evaluation
The candidate will be able to evaluate vulnerable processes and exploit them to gain access to secure information. Evaluate Windows firewall configurations and use Powershell to perform complex Windows administration tasks.
Other Popular Courses
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Intermediate
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 4 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT
Next Generation Mindfulness
- Duration: 1 Days
- Language: English
- Level: Foundation
- Exam: NGM