Course Outline
Organizations and companies face a critical stage; cyber-attacks have transformed dramatically over the past few years. Unfortunately, banks, corporates and financial services are still being breached too often, most frequently by those with insider access, and as a result, these companies are under more pressure than ever to secure their financial systems.
Upcoming Meetings
There are no upcoming meetings for this course. Contact us to schedule this course, which will be customized specifically for your organization.
info@hackerupro.comModules
Virtualization
- What is Virtualization
- Hypervisors
- Virtual Environment Setup
- Virtualized Hardware
- Virtualization Maintenance
- Advanced Virtualization
Intro to Linux & Users and Permissions
- Introduction to Linux
- Distributions
- File System
- Users
- Basic Commands
- Editing Files
- Linux Operators
- Filtering Output
- User & Group Management
- Permissions
- Su & Sudo
- Monitoring Resources
Linux Network Configuration & Package Management
- Configure Network Settings
- Network Troubleshooting
- Debian Packages
- Apt Packages
- Package Management
- Install Repository
- Apache2
- Telnet
- SSH
- FTP
- SMB
- SFTP
Cyber Kill Chain
- What is Information Security
- Terminology
- Types of Hackers
- Hacker State of Mind
- World of Security
- Operation systems
Brute Force
- Password Cracking
- Passwords and hashes
- Attack Vectors
- Brute Force Tools
- Dictionary Attack
- Automation Tools
DFIR Fundamentals
- DFIR Fundamentals
- Image Capture
- Memory Capture
- Forensics Tools
- Forensic Methodologies
SOC Life Cycle
- SOC Fundamentals
- SOC Team Responsibilities
- Incident Prioritization
- Vulnerability Assessment
Utilizing SOAR in a SIEM Environment
- SOAR
- Automation Objectives
- Successful Defense
- Effective Usage
- Demisto
Malware Analysis & Reverse Engineering – Static Analysis
- Malware Analysis Introduction
- Enumeration Techniques & Common Scanners
- Portable Executable
- Dynamic Link Library
Malware Analysis & Reverse Engineering – Dynamic Analysis
- Dynamic Analysis Introduction
- System Monitoring
- Networking Monitoring
- Malware Samples
Reversing with IDA
- Introduction to IDA
- IDA Code Flow
- Documentation Options
- Patching with IDA
PowerShell
- PowerShell Fundamentals
- PowerShell ISE
- PowerShell Modules
- PowerCat & Nishang
- PowerShell to EXE
Privilege Escalation
- Windows Privileges
- Domain Privileges
- Windows Boot Process
- Exploitation
- Windows Defender ATP
- Means of Protection
Bypass SIEM Detection
- Detection Fundamentals
- Detection Bypass methodologies & Tools
- External Bypass
- Internal Bypass
Obfuscation
- What is Obfuscation?
- Types of Obfuscation
- Packing
- Various Tools
- Tools Comparison
- Multi-Layered Obfuscation
Threat Hunting Vs Threat Intelligence
- Threat Hunting
- Threat Intelligence
- Hunts and Cycles
- Manual Threat Hunting
- Threat Hunting Automation
- Threat Hunting with Zeek
ELK
- ELK Components
- ELK installation & Configuration
- ELK Functions
- Threat Hunting with ELK
Office Exploitation
- VBA & Macro Injection
- DDEAUTO Word Exploitation
- CSV Injection
- PowerPoint Exploitation
- Social Engineering with SFX
- Full Review over all the modules
Prerequisites
- People with an IT background skill and Experience with both Linux and Windows operation system.
Upcoming Meetings
There are no upcoming meetings for this course. Contact us to schedule this course, which will be customized specifically for your organization.
info@hackerupro.comDiscover best practices & innovative techniques to help combat cyber attacks”Download Full Syllabus