Hacker Tools, Techniques, Exploits, and Incident Handling

Provided by

About the course

Cyber Security Training in Zurich 2019

SANS is recognised around the world as the best place to develop the deep, hands-on cyber security skills most needed right now. Join us for SANS Zurich (February 18-23) for immersion training that will provide you with the skills to defend your organisation against security breaches and prevent future attacks.

Spotlight Course:

All SANS courses are world-class cyber security courses, but every event we like to choose a course and ask the instructors to give a bit more insight into the course.

Take advantage of these opportunities to get the most of your training:

  • Distinguish yourself as an information security leader by preparing for your GIAC Certification.
  • Network with like-minded security professionals facing similar challenges.
  • Attend evening bonus sessions led by SANS instructors and gain insight into the latest cyber security topics.
  • Extend your SANS course by four months with an OnDemand Bundle.

Our mission at SANS is to deliver cutting-edge information security knowledge and skills to all students in order to protect people and assets. At the heart of everything we do is the SANS Promise: Students will be able to use the new skills they have learned as soon as they return to work. See that promise in action at SANS Zurich 2019.

    Instructor: John Strand
    Cost €6,275 EUR

    GCIH Certification
    Affiliate Pricing
    37 CPEs
    Laptop Required

    Masters Program
    DoDD 8140
    (IAT Level III)
    Cyber Guardian

The Internet is full of powerful hacking tools and bad guys using them extensively. If your organization has an Internet connection or one or two disgruntled employees (and whose doesn't!), your computer systems will get attacked. From the five, ten, or even one hundred daily probes against your Internet infrastructure to the malicious insider slowly creeping through your most vital information assets, attackers are targeting your systems with increasing viciousness and stealth. As defenders, it is essential we understand these hacking tools and techniques.

By helping you understand attackers' tactics and strategies in detail, giving you hands-on experience in finding vulnerabilities and discovering intrusions, and equipping you with a comprehensive incident handling plan, this course helps you turn the tables on computer attackers. It addresses the latest cutting-edge insidious attack vectors, the "oldie-but-goodie" attacks that are still prevalent, and everything in between. Instead of merely teaching a few hack attack tricks, this course provides a time-tested, step-by-step process for responding to computer incidents, and a detailed description of how attackers undermine systems so you can prepare, detect, and respond to them. In addition, the course explores the legal issues associated with responding to computer attacks, including employee monitoring, working with law enforcement, and handling evidence. Finally, students will participate in a hands-on workshop that focuses on scanning for, exploiting, and defending systems. It will enable you to discover the holes in your system before the bad guys do!

The course is particularly well-suited to individuals who lead or are a part of an incident handling team. General security practitioners, system administrators, and security architects will benefit by understanding how to design, build, and operate their systems to prevent, detect, and respond to attacks.

You Will Learn:

    How best to prepare for an eventual breach
    The step-by-step approach used by many computer attackers
    Proactive and reactive defenses for each stage of a computer attack
    How to identify active attacks and compromises
    The latest computer attack vectors and how you can stop them
    How to properly contain attacks
    How to ensure that attackers do not return
    How to recover from computer attacks and restore systems for business
    How to understand and use hacking tools and techniques
    Strategies and tools for detecting each type of attack
    Attacks and defenses for Windows, Unix, switches, routers, and other systems
    Application-level vulnerabilities, attacks, and defenses
    How to develop an incident handling process and prepare a team for battle
    Legal issues in incident handling

If you are unfamiliar with Linux, please view this short Intro to Linux video to help get you started.

Course Syllabus

  SEC504.1: Incident Handling Step-by-Step and Computer Crime Investigation
  SEC504.2: Computer and Network Hacker Exploits - Part 1
  SEC504.3: Computer and Network Hacker Exploits - Part 2
  SEC504.4: Computer and Network Hacker Exploits - Part 3
  SEC504.5: Computer and Network Hacker Exploits - Part 4
  SEC504.6: Hacker Tools Workshop



Related article

As we become more reliant on digital technologies, the cyber security industry has grown in order to protect organisations against online attacks. ...