×
Phoenix TS

Hacker Methodologies for Security Professionals

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Course Overview

This five (5) day course begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. Finally, students will study those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web.

By the end of this course, students will be able to:

  • Understand basic hacking techniques and strategies
  • Gain an understanding of cyber criminals and their motives
  • Engage in labs and activities
  • Get a technical overview of hacking tools
  • Analyze cyber hacking methodologies from the perspective of tje Red Team
  • Practice and perform pen tests

Schedule

Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.

Course Outline

Part One

Hacker Techniques and Tools

  • Module One: Hacking: The Next Generation
  • Module Two: TCP/IP Review
  • Module Three: Cryptographic Concepts
  • Module Four: Four Physical Security

 

Part Two

A Technical and Social Overview of Hacking

  • Module Five: Footprinting Tools and Techniques
  • Module Six: Port Scanning
  • Module Seven: Enumeration and Computer System Hacking
  • Module Eight: Wireless Vulnerabilities
  • Module Nine: Web and Database Attacks
  • Module Ten: Malware
  • Module Eleven: Sniffers, Session Hijacking, and Denial of Service Attacks
  • Module Twelve: Linux and Penetration Testing
  • Module Thirteen: Social Engineering

 

Part Three

Incident Response and Defensive Technologies

  • Module Fourteen: Incident Response
  • Module Fifteen: Defensive Technologies

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org

Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!

Name(Required)