Hacker Methodologies for Security Professionals

Catalog Home Cybersecurity, Hacking & IT Auditing Hacking

There are no scheduled dates for this course.

  Available by Request

This course provides a flexible methodology for use in emulating external and internal network intrusion threat vectors.

Although no specific courses are required, students should have some level of experience with Microsoft Windows and Linux operating systems as well as a basic understanding of TCP/IP networking

5 Days/Lecture & Lab

Incident Responders who need to understand and react to IDS alerts

  • Network Defenders seeking to understand Common Access Methods
  • Security Managers who desire to improve their Defensive Model
  • Security Operations Center Staff seeking to identify signs of compromise
  • New members of Penetration Testing and Vulnerability Assessment Teams

Footprinting

  • Scanning
  • Enumeration
  • Web Hacking
  • System Hacking (Windows)
  • System Hacking (Unix)





Copyright © 2018 ProTech. All Rights Reserved.

Sign In Create Account

Navigation

Social Media