(Click Category to List Courses)
42 - IT-S Information Technology - Security and Audit
IT-S 126 - Hacker Tools, Techniques, Exploits, and Incident Handling
Code | Start Date | Duration | Venue | |
---|---|---|---|---|
IT-S 126 | 30 December 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 126 | 20 January 2025 | 5 Days | Istanbul | Registration Form Link |
IT-S 126 | 17 March 2025 | 5 Days | Istanbul | Registration Form Link |
IT-S 126 | 12 May 2025 | 5 Days | Istanbul | Registration Form Link |
IT-S 126 | 07 July 2025 | 5 Days | Istanbul | Registration Form Link |
IT-S 126 | 01 September 2025 | 5 Days | Istanbul | Registration Form Link |
IT-S 126 | 27 October 2025 | 5 Days | Istanbul | Registration Form Link |
IT-S 126 | 22 December 2025 | 5 Days | Istanbul | Registration Form Link |
Course Description
This course helps participant understand hackers' tactics and strategies in detail, giving them hands-on experience in finding vulnerabilities and discovering intrusions in their internet connections, equipping them with a comprehensive incident handling plan. This course helps them turn the tables on computer attackers. It addresses the latest cutting-edge insidious attack vectors, the "oldie-but-goodie" attacks that are still prevalent, and everything in between. Instead of merely teaching a few hack attack tricks, this course provides a time-tested, step-by-step process for responding to computer incidents, and a detailed description of how attackers undermine systems so they can prepare, detect, and respond to them.
Course Objectives
- Understaning the step-by-step approach used by many computer attackers
- Preparing for proactive and reactive defenses for each stage of a computer attack
- Identifying active attacks and compromises
- Understanding how to properly contain attacks
- Learning how to recover from computer attacks and restore systems for business
- Understanding and using hacking tools and techniques
Who Should Attend?
- General security practitioners
- System administrators
- Security architects
Course Details/Schedule
Day 1
- Incident Handling Step-by-Step and Computer Crime Investigation
- Building an incident response kit
- Identification of an incident
- Containment and quarantine
- Pull the network cable, switch and site
- Identifying and isolating the trust model
- Eradication
- Recovery
- Special Actions for Responding to Different Types of Incidents
- Incident Record-keeping
- Incident Follow-up
Day 2
- Computer and Network Hacker Exploits
- Reconnaissance
- Scanning
- Intrusion Detection System (IDS) Evasion
Day 3
- Computer and Network Hacker Exploits
- Network-Level Attacks
- Gathering and Parsing Packets
- Operating System and Application-level Attacks
- Netcat: The Attacker's Best Friend
Day 4
- Computer and Network Hacker Exploits
- Password Cracking
- Web Application Attacks
- Denial-of-Service Attacks
Day 5
- Computer and Network Hacker Exploits
- Maintaining Access
- Covering the Tracks
- Putting It All Together