(Click Category to List Courses)

42 - IT-S Information Technology - Security and Audit

IT-S 126 - Hacker Tools, Techniques, Exploits, and Incident Handling

Code Start Date Duration Venue
IT-S 126 23 October 2023 5 Days Istanbul Registration Form Link
IT-S 126 18 December 2023 5 Days Istanbul Registration Form Link
Please contact us for fees


Course Description

This course helps participant understand hackers' tactics and strategies in detail, giving them hands-on experience in finding vulnerabilities and discovering intrusions in their internet connections, equipping them with a comprehensive incident handling plan. This course helps them turn the tables on computer attackers. It addresses the latest cutting-edge insidious attack vectors, the "oldie-but-goodie" attacks that are still prevalent, and everything in between. Instead of merely teaching a few hack attack tricks, this course provides a time-tested, step-by-step process for responding to computer incidents, and a detailed description of how attackers undermine systems so they can prepare, detect, and respond to them.

Course Objectives

  • Understaning the step-by-step approach used by many computer attackers
  • Preparing for proactive and reactive defenses for each stage of a computer attack
  • Identifying active attacks and compromises
  • Understanding how to properly contain attacks
  • Learning how to recover from computer attacks and restore systems for business
  • Understanding and using hacking tools and techniques

Who Should Attend?

  • General security practitioners
  • System administrators
  • Security architects

Course Details/Schedule

Day 1

  • Incident Handling Step-by-Step and Computer Crime Investigation
  • Building an incident response kit
  • Identification of an incident
  • Containment and quarantine
  • Pull the network cable, switch and site
  • Identifying and isolating the trust model
  • Eradication
  • Recovery
  • Special Actions for Responding to Different Types of Incidents
  • Incident Record-keeping
  • Incident Follow-up

Day 2

  • Computer and Network Hacker Exploits 
  • Reconnaissance
  • Scanning
  • Intrusion Detection System (IDS) Evasion

Day 3

  • Computer and Network Hacker Exploits
  • Network-Level Attacks
  • Gathering and Parsing Packets
  • Operating System and Application-level Attacks
  • Netcat: The Attacker's Best Friend

Day 4

  • Computer and Network Hacker Exploits 
  • Password Cracking
  • Web Application Attacks
  • Denial-of-Service Attacks

Day 5

  • Computer and Network Hacker Exploits
  • Maintaining Access
  • Covering the Tracks
  • Putting It All Together