Focal Point - Hacker Methodologies Security Professional
Focal Point - Hacker Methodologies Security Professional Course Details:
This course teaches students the processes threat actors use to break into organizations’ networks and steal their most sensitive data. Utilizing industry-standard penetration testing and auditing software, attendees will learn to identify, scan, and enumerate target systems; correlate services to vulnerabilities and exploits; employ exploits to gain access to the target systems; elevate privileges; propagate through the network; and cover their tracks within a target network. This course is focused primarily on Windows and Linux operating systems, so students should be comfortable with both.
Call (919) 283-1674 to get a class scheduled online or in your area!
- Exploitation Methodology
- Metasploit Familiarization
- Footprinting
- Scanning
- Enumeration
- General Attack Types
- Windows
- Linux
- Pivoting and Tradecraft
Student Practical:.
Using the tools, skills, and methodologies taught in Days 1 through 4 of the class, students will participate in a Red team exercise requiring teams to establish initial access to a DMZ, pivot to other network segments, and retrieve requested information.
*Please Note: Course Outline is subject to change without notice. Exact course outline will be provided at time of registration.
- Identify the classes of hackers, their motivations, and the methodologies employed by threat actors
- Use publicly available tools and open source intelligence techniques to develop a target footprint
- Scan and enumerate targets to identify underlying operating systems and services
- Research and leverage exploits for vulnerable services to achieve access to target systems
- Identify system configuration weaknesses and viable privilege escalation tactics
- Analyze exploited systems to identify and remove indicators of compromise
- Employ system tools to exploit additional targets within an internal network
- Linux Refresher
- Metasploit Familiarization
- Footprinting
- Scanning
- Enumeration
- Web Exploitation
- Windows Enumeration
- Responder Lab
- Windows Exploitation
- Windows Privilege Escalation
- Mimikatz
- SNMP
- Linux Privilege Escalation
- Linux Persistence
- Tunneling
- A strong understanding of TCP/IP networking is required
- A strong familiarity with the Windows and Linux CLI is required
- A strong understanding of the Windows and Linux OS is required
- Threat Hunters who need to understand hacker behavior and methodology
- Security Analysts and Incident Responders who need to identify signs of compromise
- New members of penetration testing or red teams