This course enables participants to turn the tables on computer attackers by helping you understand their tactics and strategies by providing participants with hands on experience in finding vulnerabilities and discovering intrusions, and equipping you with a comprehensive incident handling plan. It addresses the latest cutting-edge insidious attack vectors, the “oldie-but-goodie” attacks that are still prevalent, and everything in between. Instead of merely teaching a few hack attack tricks, this course provides a time-tested, step-by-step process to respond to computer incidents and a detailed description of how attackers undermine systems so the participants can prevent, detect, and respond to them. Participants will experience practical workshop that focuses on scanning, exploiting, and defending systems. Participants will benefit by understanding how to design, build, and operate their systems to thwart attacks. This course also addresses incident handling methods used when information security is compromised.
Upon the completion of this course, students will be able to:
• Prepare step-by-step approach used by many computer attackers
• Proactive and reactive defenses for each stage of a computer attack
• Identify active attacks and compromises
• Ensure that attackers do not return
• Recover from computer attacks and restore systems for business
• Understand and use hacking tools and techniques.
• Understand Ethical Hacking concepts
• Apply strategies and tools to detect each type of attack
• Learn the Application-level vulnerabilities, attacks, and defenses
• Develop an incident handling process and prepare a team for battle
• Understand the Legal issues in incident handling techniques
Click the down arrow icon [ 🔽 ] to expand and collapse the course topics.
🔽 0 h 37 min | Introduction to Real World Incidents
- What constitutes an incident?
- What is incident response?
- Where we are now?
- Why should you care about incident response?
- Case studies
🔽 1 h 03 min | Introduction about Incident Response (IR) Management
- What is a computer security incident?
- What are the goals of incident response?
- Who is involved in the IR process?
- Finding IR talent
- How to hire IR talent
- The incident response process
- Tracking of significant investigative information
🔽 0 h 45 min | Overview of Pre-Incident Preparation
- Preparing the organization for incident response
- Preparing the IR team
- Preparing the infrastructure for incident response
🔽 0 h 34 min | Cyber Intelligence, Cyber Conflicts, and Cyber Warfare
- Cyber intelligence and counter intelligence
- Cyberspace and cyber intelligence
🔽 0 h 42 min | Introduction to Digital Forensics
- Definition of computer forensics
- Evolution of computer forensics
- Uses of computer forensics
- Role of forensics investigator
- Forensics readiness
🔽 0 h 42 min | Introduction to Cyber Terrorism-Meaning, Challenges and Issues
- Cyber terrorism-meaning
- Characteristics of cyber terrorism
- Cyber terrorism-challenges and problems
- Who are cyber terrorists?
- Computer attack and cyber terrorism
- Characteristics of physical attack
- Six types of hacker motivations
🔽 0 h 55 min | Introduction to Ethical Hacking, Information Gathering Techniques, Vulnerability Assessment, Network Sniffing and Social Engineering
- Important terminologies of ethical hacking
- What is a penetration test?
- Active information gathering
- Passive information gathering
- Sources of information gathering
- Pros and cons of a vulnerability scanner
- Vulnerability assessment with Nmap
- Types of sniffing
- MITM attacks
- Web exploitation
- SQL injection
- Social engineering
- Social engineering attack cycle
This course includes:
5 h 37 min recorded video
Downloadable resources (books and articles)
One year access
Access on mobile and TV
Certificate of completion