Understand Hackers’ Tools, Tactics, Techniques & Strategies
The internet is full of powerful hacking tools and bad guys using them extensively. If your organization has an Internet connection or one or two disgruntled employees your computer systems will get attacked. From the five, ten, or even one hundred daily probes against your Internet infrastructure to the malicious insider slowly creeping through your most vital information assets, attackers are targeting your systems with increasing viciousness and stealth. As defenders, it is essential we understand these hacking tools and techniques. By helping you understand attackers' tactics and strategies in detail, giving you hands-on experience in finding vulnerabilities and discovering intrusions, and equipping you with a comprehensive incident handling plan, this course helps you turn the tables on computer attackers.
This course addresses the latest cutting-edge insidious attack vectors, the attacks that are still prevalent, and everything in between. Instead of merely teaching a few hack attack tricks, this course provides a time-tested, step-by-step process for responding to computer incidents, and a detailed description of how attackers undermine systems so you can prepare, detect, and respond to them. In addition, the course explores the legal issues associated with responding to computer attacks, including employee monitoring, working with law enforcement, and handling evidence. Finally, students will participate in a hands-on workshop that focuses on scanning for, exploiting, and defending systems. It will enable you to discover the holes in your system before the bad guys do! The course is particularly well-suited to individuals who lead or are a part of an incident handling team. General security practitioners, system administrators, and security architects will benefit by understanding how to design, build, and operate their systems to prevent, detect, and respond to attacks. The course will help you know:
By the end of this course, delegates will be able to:
IT Engineers, IT Professionals, IT Directors, Engineers, IT Project Managers, IT Auditors, IT Compliance Managers, IT Coordinators, IT Support Managers, IT Officers, IT Support Specialists, IT System Administration, Technical Support Professionals, Chief Information Officers, Chief Risk Officers, Information Assurance Officers, Program Managers, Network Systems Analysts, Government Program Managers, R&D Project Managers, Software and System Developers, Chief Security Officers, Security Specialists, Chief Information Security Officers, Directors of Security, Security Architects, Security Operation Center Managers, Security Consultants, Security Managers, Security Auditors, Security Directors, Systems Administrators, Incident Response Analysts, Business Owners, Security Analysts, Security Systems Engineer, Network Architect, Operations Managers, Risk Management Professionals, Network Administration Professionals, Application Developers, Application Support Analysts, Application Engineers, Associate Developers, Technology Officers, Information Officers, Help Desk Specialist, Help Desk Technician, Database Administrators, Network Architects, Network Engineers, Network System Administrators, System Analysts, System Architects, System Designers
Preparation
Identification
Containment
Eradication
Recovery
Special Actions for Responding to Different Types of Incidents
Incident Record-keeping
Reconnaissance
Scanning
Intrusion Detection System (IDS) Evasion
Network-Level Attacks
Gathering and Parsing Packets
Operating System and Application-level Attacks
Netcat: The Attacker's Best Friend
Password Cracking
Web Application Attacks
Denial-of-Service Attacks
Maintaining Access
Covering the Tracks
Putting It All Together
Hands-on Analysis
Code | From | To | City | Fee | |
---|---|---|---|---|---|
IT38 | 24 Feb 2020 | 28 Feb 2020 | Jakarta | US$ 5500 | Book |
IT38 | 20 Apr 2020 | 24 Apr 2020 | Madrid | US$ 5500 | Book |
IT38 | 22 Jun 2020 | 26 Jun 2020 | Kuala Lumpur | US$ 4500 | Book |
IT38 | 24 Aug 2020 | 28 Aug 2020 | Manila | US$ 5500 | Book |
IT38 | 25 Oct 2020 | 29 Oct 2020 | Cairo | US$ 3900 | Book |
IT38 | 21 Dec 2020 | 25 Dec 2020 | Munich | US$ 6000 | Book |
DUBAI OFFICE
Ittihad Deira Building, |
USA OFFICE 642 E14 Street,10009-13 Manhattan, New York (NY) USA info@petrogas-training.com |
EGYPT OFFICE 52 General Kamal Hejab Street,Suez Bridge, Cairo, Egypt info@petrogas-training.com |
Certificate of Completion will be provided to the candidate(s) who successfully attend and complete the course. Training hours attendance percentage of 75% is required.
Standard course hours: 8:30 A.M. to 3:30 P.M. Informal discussions: 4:30 P.M. to 5:30 P.M.
We use a blend of interactive and hands-on methods, active participation, a variety of instructional techniques, dynamic presentations, individual and group exercises, in depth discussion, DVD’s, role-plays, case studies, examples. All of the information, competencies, knowledge and skills acquired within our training programs, are 100% transferrable to the participants’ workplace.
Pre-Test and Post-Test Assessment are applied on 5-day and 10-day programs. Also, post course evaluation and candidate’s evaluation are applied to add another level of quality measurement. Candidates’ feedback is highly appreciated to elevate the training service quality.
A- Have staff trained in the latest training and development approaches
B- Support nationalization and talent management initiatives
C- Have properly trained and informed people who will be able to add value
D- Gain relevant technical knowledge, skills and competencies
A- Develop job related skills
B- Develop personal skills in subject matter
C- Have a record of your growth and learning results
D- Bring proof of your progress back to your organization
F- Become competent, effective and productive
G- Be more able to make sound decisions
H- Be more effective in day to day work by mastering job-related processes
I- Create and develop competency to perform job well
A- 10% discount after 05 candidates’ registration.
B- 15% discount after 10 candidates’ registration.
C- 20% discount after 20 candidates’ registration.
D- 25% discount after 25 candidates’ registration.
E- 30% discount after 30 candidates’ registration
F- Higher discount rates will be offered based on work volume with different clients.
A- One extra free seat is offered on 4 candidates on the same course and dates.
B- Two extra free seats are offered on 6 candidates on the same course and dates.
C- Three extra free seats are offered on 8 candidates on the same course and dates.
D- Four extra free seats are offered on 10 candidates on the same course and dates.
E- Five extra free seats are offered on 12 candidates on the same course and dates.
Nominations to our public courses are to be processed by the client’s Training and/or HR departments. A refund will be issued back to the client in the event of course cancellation or seat unavailability. A confirmation will be issued to the relevant department official(s).
If a confirmed registration is cancelled less than 5 working days prior to the course start date, a substitute participant may be nominated to attend the same course or a 20% cancellation charge is applied. In case of a no-show, a 100% fee will be charged.
PAYMENT POLICY
Payment is due upon receiving the course confirmation, invoice and/or proforma invoice. However; the fee due can be wire transferred to our bank account directly after course completion. Our bank details are illustrated on the confirmation, invoice and proforma invoice, as well. The above documents can be communicated electronically, i.e., in a soft copy or/and in hard copy based on customer’s request.
COPYRIGHT
© 2017. Material published by PETROGAS shown here is copyrighted. © 2017. All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing in any medium, transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.