Wait a minute..

Incident Handler

In this course, participants will be invited to follow the attack process built by the attackers in an effort to understand the flow of the attack process in a computer security incident.

Live Virtual Classroom
Intermediate 0(0 Ratings)
Created by Hacktrace Indonesia
What will I learn?
  • Apply incident handling process, including preparation, identification, containment, eradication, and recovery to protect the environment
  • Analyze the method of common attack techniques in order to evaluate the attacker’s movement related to the incident
  • Utilize tools and evidence to determine the kind of techniques used in attack, including backdoors, rootkits, or malware, choosing appropriate response to each
  • Analyze the memory dumps to determine attacker’s activities on a machine, or other machines that related to the incident
  • Analyze shell history files to find compromised machines, attacker’s controlled accounts, and backdoors
Live virtual classroom schedule

Live online features
  • Instructor led, virtual streaming of your course with instructor Q&A
Offers
  • Hacktrace Certification Exam will be send after 7 days after course completion

Curriculum for this course
Incident Handling Step-by-Step
5 Lessons
  • Introduction to Incident Handling
  • Setting up and Check Environment Student
  • Type of Incidents that Needs Special Actions
  • Incident Record-keeping
  • Incident Follow-up
  • Information Gathering Techniques
  • Scanning Techniques
  • Intrusion Detection Evasion Techniques
  • Network Level Attack Techniques
  • Session Management Testing
  • Gathering and Parsing Packets
  • Operating System and Application-level Attacks
  • Netcat for Fun and Profit
  • Password Cracking
  • Common Web Application Attack
  • Denial of Service Attack
  • Maintaining Access
  • Covering the Tracks
  • Putting It All Together
  • Tools Results and Hands-on Analysis
  • Case Study: Memory Analysis
  • Case Study: Web Attack Intrusion Analysis
Requirements
  • This course is perfect for individuals who lead or are part of the incident handling team.
  • Common security practitioners
  • System administrators
  • Security architects will benefit by understanding how to design
  • Operate their systems to prevent, detect, and respond to attacks
+ View more
Description

In this course, participants will be invited to follow the attack process built by the attackers in an effort to understand the flow of the attack process in a computer security incident. By understanding how an attacker performs an attack, participants will be able to build a process of attack pattern analysis aimed at finding the origin of an attack. Based on these activities, participants can prevent or predict the next attack pattern. 

+ View more
Other related courses

Student feedback
0
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews

Hi, you can chat with me

...