Phoenix TS

Hacker Methodologies for Security Professionals

Course Overview

This five (5) day course begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. Finally, students will study those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web.

By the end of this course, students will be able to:

  • Understand basic hacking techniques and strategies
  • Gain an understanding of cyber criminals and their motives
  • Engage in labs and activities
  • Get a technical overview of hacking tools
  • Analyze cyber hacking methodologies from the perspective of tje Red Team
  • Practice and perform pen tests


Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 240-667-7757.

Course Outline

Part One

Hacker Techniques and Tools

  • Module One: Hacking: The Next Generation
  • Module Two: TCP/IP Review
  • Module Three: Cryptographic Concepts
  • Module Four: Four Physical Security


Part Two

A Technical and Social Overview of Hacking

  • Module Five: Footprinting Tools and Techniques
  • Module Six: Port Scanning
  • Module Seven: Enumeration and Computer System Hacking
  • Module Eight: Wireless Vulnerabilities
  • Module Nine: Web and Database Attacks
  • Module Ten: Malware
  • Module Eleven: Sniffers, Session Hijacking, and Denial of Service Attacks
  • Module Twelve: Linux and Penetration Testing
  • Module Thirteen: Social Engineering


Part Three

Incident Response and Defensive Technologies

  • Module Fourteen: Incident Response
  • Module Fifteen: Defensive Technologies
Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!