Hacker Methodologies for Security Professionals Training
Hacker Methodologies for Security Professionals
This course teaches students the processes threat actors use to break into organizations’ networks and steal their most sensitive data. Utilizing industry-standard penetration testing and auditing software, attendees will learn to identify, scan, and enumerate target systems; correlate services to vulnerabilities and exploits; employ exploits to gain access to the target systems; elevate privileges; propagate through the network; and cover their tracks within a target network. This course is focused primarily on Windows and Linux operating systems, so students should be comfortable with both.
Training at a glance
Level
Intermediate
Duration
5 Days
Experience
2 years: Command-line & TCP/IP
Average Salary
$120,000
Labs
Yes
Level
Intermediate
Duration
5 Days
Experience
2 years: Command-line & TCP/IP
Average Salary
$120,000
Labs
Yes
Training Details
After successfully completing this course, students will be able to:
- Identify the classes of hackers, their motivations, and
the methodologies employed by threat actors - Use publicly available tools and open source
intelligence techniques to develop a target footprint - Scan and enumerate targets to identify underlying
operating systems and services - Research and leverage exploits for vulnerable services
to achieve access to target systems - Identify system configuration weaknesses and viable
privilege escalation tactics - Analyze exploited systems to identify and remove
indicators of compromise - Employ system tools to exploit additional targets
within an internal network
Lesson 1 : Hacker Techniques and Tools
- Module One: Hacking: The Next Generation
- Module Two: TCP/IP Review
- Module Three: Cryptographic Concepts
- Module Four: Four Physical Security
Lesson 2: A Technical and Social Overview of Hacking
- Module Five: Footprinting Tools and Techniques
- Module Six: Port Scanning
- Module Seven: Enumeration and Computer System Hacking
- Module Eight: Wireless Vulnerabilities
- Module Nine: Web and Database Attacks
- Module Ten: Malware
- Module Eleven: Sniffers, Session Hijacking, and Denial of Service Attacks
- Module Twelve: Linux and Penetration Testing
- Module Thirteen: Social Engineering
Lesson 3: Incident Response and Defensive Technologies
- Module Fourteen: Incident Response
- Module Fifteen: Defensive Technologies
- Threat Hunters who need to understand hacker behavior and methodology
- Security Analysts and Incident Responders who need to identify signs of compromise
- New members of penetration testing or red teams
- Familiarity with Windows or Linux command-line interfaces
- Knowledge of TCP/IP networking
- Successful completion of OS Internals for Security Professionals
Upcoming Classes
We offer more than just Hacker Methodologies for Security Professionals Training
Our successful training results keep our corporate and military clients returning. That’s because we provide everything you need to succeed. This is true for all of our courses.
Strategic Planning & Project Management
From Lean Six Sigma to Project Management Institute Project Management Professional, Agile and SCRUM, we offer the best-in-class strategic planning and project management training available. Work closely with our seasoned multi-decade project managers.
IT & Cybersecurity
ATA is the leading OffSec and Hack the Box US training provider, and a CompTIA and EC-Council award-winning training partner. We offer the best offensive and defensive cyber training to keep your team ahead of the technology skills curve.
Leadership & Management
Let us teach your team the high-level traits and micro-level tools & strategies of effective 21st-century leadership. Empower your team to play to each others’ strengths, inspire others and build a culture that values communication, authenticity, and community.