Course Overview
Hacker Techniques, Tools and Incident Handling training is a 4-day instructor-led training designed to give students hands-on experience with different hacking and incident handling methods. This course follows the NICE framework.
At the end of the training students should be able to:
- Explain the history and current state of hacking and penetration testing including ethical and legal implications
- Describe cryptology
- Identify common information gathering tools and techniques
- Analyze system and wireless network vulnerabilities exploited by hackers
- Perform web and database attacks
- Remove trojans, backdoors, and malware from infected systems
- Perform network traffic analysis and sniffing using appropriate tools
- Perform incident handling by using appropriate methods
Schedule
Hacker Techniques, Tools and Incident Handling Training
date
location
price
![[image]](https://phoenixts.com/wp-content/themes/phoenixts-com/assets/images/temp/image-9@2x.jpg)
Not seeing a good fit?
Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.
Learn more about custom training
Course Outline
Hacker Techniques and Tools
- Hacking: The Next Generation
- TCP/IP review
- Cryptographic concepts
- Physical security
Technical Overview of Hacking
- Footprinting tools and techniques
- Portscanning
- Enumeration and computer system hacking
- Wireless vulnerabilities
- Web and database attacks
- Trojans and backdoors
- Malware, worms, and computer viruses
- Sniffers, session hijacking, and denial of service
- Linux, live CDs, ad automated assessment tools
Incident Response and Defensive Technologies
- Incident response
- Defensive technologies
Hacker Techniques, Tools and Incident Handling Training FAQs
Before attending the course, it is recommended that students have:
– Work experience in the IT security field
– CompTIA Security+ or EC-Council CEH certification or equivalent experience and knowledge
This training course is recommended for individuals with the following job roles/titles:
– IT Auditors
– IT Managers
– Information Security Analysts
– Information Security Managers
– System Administrators
“The instructor was very knowledgeable and encouraged a professional learning environment. He made the class very interesting and help me learn more by providing more hands on. The course could have lasted one more day. I felt somewhat rushed at times. We learned a great deal with windows XP, but I think we would have been better off with Linux boxes. Overall, I was pleased with the class/course and the location. Thank you!!”
– Student, January 2019
“I really enjoyed the class and the instructor was incredibly knowledgeable.”
– Student, September 2019