Focal Point - Hacker Methodologies Security Professional
This course teaches students the processes threat actors use to break into organizations’ networks and steal their most sensitive data. Utilizing industry-standard penetration testing and auditing software, attendees will learn to identify, scan, and enumerate target systems; correlate services to vulnerabilities and exploits; employ exploits to gain access to the target systems; elevate privileges; propagate through the network; and cover their tracks within a target network. This course is focused primarily on Windows and Linux operating systems, so students should be comfortable with both.
WHAT YOU'LL LEARN
- Identify the classes of hackers, their motivations, and the methodologies employed by threat actors
- Use publicly available tools and open source intelligence techniques to develop a target footprint
- Scan and enumerate targets to identify underlying operating systems and services
- Research and leverage exploits for vulnerable services to achieve access to target systems
- Identify system configuration weaknesses and viable privilege escalation tactics
- Analyze exploited systems to identify and remove indicators of compromise
- Employ system tools to exploit additional targets within an internal network
WHO SHOULD ATTEND?
- Threat Hunters who need to understand hacker behavior and methodology
- Security Analysts and Incident Responders who need to identify signs of compromise
- New members of penetration testing or red teams
PREREQUISITES
- A strong understanding of TCP/IP networking is required
- A strong familiarity with the Windows and Linux CLI is required
- A strong understanding of the Windows and Linux OS is required
- TCP/IP Networking
COURSE OUTLINE
- Exploitation Methodology
- Metasploit Familiarization
- Footprinting
- Scanning
- Enumeration
- General Attack Types
- Windows
- Linux
- Pivoting and Tradecraft
LABS OUTLINE
- Linux Refresher
- Metasploit Familiarization
- Footprinting
- Scanning
- Enumeration
- Web Exploitation
- Windows Enumeration
- Responder Lab
- Windows Exploitation
- Windows Privilege Escalation
- Mimikatz
- SNMP
- Linux Privilege Escalation
- Linux Persistence
- Tunneling
Sorry! It looks like we haven’t updated our dates for the class you selected yet. There’s a quick way to find out. Contact us at 502.265.3057 or email info@training4it.com
Request a Date