SEC504 Hacker Tools, Techniques, Exploits and Incident Handling

*QCERT Terms and Conditions apply

Course Description:

Course overview

This course will provide hands-on experience in finding vulnerabilities and discovering intrusions. It will also equip individuals with a comprehensive incident-handling plan
Target audience
- Incident handlers
- Leaders of incident handling teams
- System administrators who are on the front lines defending their systems and responding to attacks
- Other security personnel who are first responders when systems come under attack
Objectives
- How best to prepare for an eventual breach
- The step-by-step approach used by many computer attackers
- Proactive and reactive defenses for each stage of a computer attack
- How to identify active attacks and compromises
- The latest computer attack vectors and how you can stop them
- How to properly contain attacks
- How to ensure that attackers do not return
- How to recover from computer attacks and restore systems for business
- How to understand and use hacking tools and techniques
- Strategies and tools for detecting each type of attack
- Attacks and defenses for Windows, Unix, switches, routers, and other systems
- Application-level vulnerabilities, attacks, and defenses
- How to develop an incident handling process and prepare a team for battle
- Legal issues in incident handling
Pre-requisites    ITIL foundation course
- A strong desire to understand hacker tools and techniques
- A foundational understanding of the Windows Command Line
- A foundational understanding of core networking concepts such as TCP/IP
- A strong desire to understand how key defensive tactics can thwart advanced attackers