Wait a minute..

THE MOST ULTIMATE DEFENSIVE BOOTCAMP TRAINING PROGRAM

The complete fundamental Defensive Training Program to prepare your future carrier as a professional Defender.

Next Batch Coming Soon

WHY DEFENDER ?

The demand for a professional Defender is now become the as important as a Pentester needs. An organization now realize that a Defense System is just the same urgency as the Offensive as well. Don’t let anyone fool you; Defensive Cybersecurity is just as in demand as its Offensive counterpart. Red hackers and penetration testers might be all the rage with a small slice of cyber defense enthusiasts, but becoming a threat analyst and defensive whizz is just as fulfilling. This course is for those who seek to be a bit different.

The one advantage of being a Defensive Cybersecurity expert is the level of knowledge you will receive. The Blue Hacker sphere has far more sub-fields contained in it, giving you a far broader scope of expertise than your Red counterparts. Are you interested in becoming a defensive genius? Join our Bootcamp today!

 

Regular Training vs Bootcamp


Regular Training

  • Takes more time ( > 2 months )
  • Full day lecture in whole weeky
  • The theme sometimes not focus
  • More theoretical
  • Upgrade competency purpose

Bootcamp

  • Takes less time ( < 2 months )
  • Can arrange more flexible
  • The material more specific and focus
  • Hands-on and applicable
  • Prepared to be a talent ready

Why Hacktrace?

Hacktrace is the solution to answer the needs and gap within the Learning Management System platform that combine the Training Path, Syllabus, Training Material, and Hacktrace Ranges and also fully support with international certified experience trainers that already tested in years based on real cases in clients as well.

2 Months Live Virtual Classess
International Certified Trainer
Easy Payment Methods
Lots of Group Discussions and Practice Time
Class delivered in Indonesian
Pormising Job Opportunities and Career Paths (Best Graduates Will Be Recruited Immediately and Bootcamp Fees Refunded)
Limited Student/Batch
Join the Local and Overseas Hacker Comunity

What Will You Learn

  • Cybersecurity Fundamental
  • What is information security?
  • Why is information security important?
  • Consequences of security breaches
  • Student Exercise
  • Data Security
  • Risk, Threats, and Vulnerabilities
  • Privacy and Surveillance
  • Information Warfare and Cyber War
  • Student Exercise
  • Web application hardening best practice
  • Web application hardening best practice
  • Firewall Introduction
  • Student Exercise
  • Defensible Architecture
  • Web Application Security
  • OWASP Top 10
  • Basic Web Hacking
  • Student Exercise
  • Web application firewall
  • Mobile application security
  • Student Exercise
  • Most attack against mobile devices
  • Risk and Privacy in mobile application
  • Mobile devices security awareness
  • Student Exercise
  • Server security
  • Attacks against servers
  • Basic server hacking
  • Web server hardening
  • Ubuntu hardened configuration
  • Windows hardened configuration
  • Student Exercise
  • Basic TCP/IP
  • Deadly attacks in network
  • Dangerous of public wifi and hotspot
  • Wireshark introduction
  • Basic packet analysis
  • Student Exercise
  • Using iptables to filter packet
  • Student Exercise
  • Basic network hacking
  • Perform ARP poisoning to understand ARP flaws
  • Network and security devices
  • Introduction to security operation center (SOC)
  • The needs of security event logging and monitoring
  • Asset management and what object should we monitored?
  • Student Exercise
  • Layered operations of SOC
  • Student Exercise
  • Introduction to Incident Response and Handling
  • Incident Response and Handling Methodology
  • Student Exercise
  • Type of incidents that needs special actions
  • Incident Record Keeping and Follow-up
  • Understanding MITRE ATT&CK
  • Understanding Lockheed Martin Cyber Kill Chain
  • Student Exercise
  • Identify a compromised system
  • Student Exercise
  • Services log analysis
  • Student Exercise
  • Network packet analysis using Wireshark
  • Extract information from packet capture
  • Student Exercise
  • Investigate attack using open source SIEM
  • Student Exercise
  • Why malware analysis?
  • Malware analysis objectives
  • Understanding malware characteristics
  • Common malware evasion and hiding techniques
  • Malware analysis techniques
  • Static malware analysis
  • Dynamic malware analysis
  • Forensic investigation challenges
  • Acquisition challenges
  • Determining image integrity
  • Determining filesystem and partition table of the evidence
  • Student Exercise
  • Identify existing countermeasure and anti-forensic system
  • Extracting operating system information
  • Extracting network packets information
  • Student Exercise
  • Windows Registry analysis
  • Student Exercise
  • Windows Shellbags and Prefetch analysis
  • Student Exercise
  • Windows Event Log analysis
  • Windows System Resource Usage (SRU) forensic
  • Student Exercise
  • Linux log files analysis
  • Student Exercise
  • Memory Forensic
  • Student Exercise
  • What is assessment security?
  • Vulnerability Assessment vs Penetration Test vs Bug Bounty vs Red Teaming
  • The assessment methodology
  • Conducting vulnerability assessment
  • Remediation and follow up
  • Student Exercise
  • Case Study: Investigate WannaCry detected from an endpoint
  • Case Study: Investigate attack on a Linux server
  • Case Study: Investigate Windows Event Log
  • Case Study: Windows forensic
  • Case Study: Linux forensic
  • Case Study: Linux forensic

Our Trainer

Mar'ie Muhammad, CEH, ECSA, eMAPT, CRTE, OSCP, OSWE, OSCE, OSEE

Experience more than 3 years learning about programming, 5 years in information security. Cybersecurity researcher focus on exploit development (Windows Application & Web Application).

Hanny Haliwela, OSCP, OSCE, OSEE

He experience is more than 8 years working and doing research in the field of information security. He also has an interest in Vulnerability research, Exploit development, reverse engineering, python, hacking Method, digital forensic, find unique attack -vectors, mind mapping, IT security community, IT security research based on open source.

Royke Tobing, GWAPT, GCIH, CITP

He experience more than 16 years in intelligence and law enforcement fields, learning about programming application and 3 years in network security. Information Security and Ethical Hacking trainer.

Thomas Gregory, OSCP, OSCE, ISO 27001:2013 LA, GCIA, OSEE

As a director and a partner of PT. Spentera, responsible for all areas of IT security services and products of Spentera. This includes identification of security trends, selection of technology/development platforms and methodology, prioritization of security project initiatives and delivery schedules, and oversight of the customer experience. He also communicate Spentera security strategy to investors, partners, and customers.

Bootcamp Schedule

Next Batch Coming Soon

Monday, Wednesday, Friday
17.00 - 20.00
Saturday Group Discussion
09.00 - 12.00

Tuition & Payment Methods

Full payment

Rp 30.000.000

Promo Early Bird

Promo Early Bird has ended

Card image cap

Cash 100%

Card image cap

Program Cicilan

HACKTRACE also provide you a comfortable option through an Installment Program. For those who are interested with this payment method, HACKTRACE collaborated with KoinWorks which is the provision of installment facility without credit card through KoinPintar Application. By using this application to purchase our various trainings, Buyers feel free to choose the "Instalmment Period" on the Installment Program ranging from three (3) months to twelve (12) months

Learn More
Card image cap

Income Share Agreement (ISA)

For further information please contact Hacktrace Team.

Contact Us
Please login here..