Course Summary

This course helps candidates develop superior incident response skills. Through mastery of hands-on attacker techniques, along with incident response tools and practices, participants will learn how to enhance their abilities and take their teams to the next level. Topics include Incident Handling and Computer Crime Investigation, as well as Computer and Network Hacker Exploits.

Command-Line Security and Analysis
The candidate will review command history to determine the purpose of an attacker’s actions, use tools like netcat, and analyze Windows Alternate Data Streams to uncover hidden data.

In-Depth Attack Analysis
The candidate will execute a multi-stage attack or task, focusing on both Windows and Linux/Unix systems.

Incident Investigation
The candidate will investigate a compromised Linux system, examine a breached Windows machine, and analyze logs or conduct live analysis to identify the scope and nature of the incident.

Infrastructure Analysis
The candidate will conduct cloud scanning, perform vulnerability assessments, and collect information using DNS protocol.

Password Attacks and Analysis
The candidate will carry out a password guessing attack and analyze password attacks based on logs or system tools.

Pivoting
The candidate will pivot through an intermediary point to reach a target system.

Protocol Security and Attacks
The candidate will analyze vulnerabilities from an expert perspective, including the ability to verify and prioritize vulnerabilities, identify false positives, and perform actions to assess vulnerabilities and security improvements in services such as SMB, FTP/SFTP, and SCP.

Reconnaissance
The candidate will scan a local host or network for open ports to gather reconnaissance information.

Website Security
The candidate will perform web application and injection attacks to identify vulnerabilities in a website.

The following courses or equivalent experiences are prerequisite GIAC Certified Incident Handler (GCIH)

proctored exam Open book, open notes Time limit 4 hour 25 CyberLive - hands-on, real-world practical testing. CyberLive testing creates a lab environment where cyber practitioners prove their knowledge, understanding, and skill using: Actual programs Actual code Virtual machines

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?