This live and interactive training is designed to help you understand your network environment, monitor it for threats, perform incident response against identified threats, and learn different adversary tactic, techniques, and procedures (TTPs). You will gain hands-on experience of the process of monitoring, responding to, and remediating internal threats (also known as active defense). You will learn how to use tools such as Security Onion and RedHunt OS to perform digital forensics and incident response (DFIR), as well as Threat Hunting.
In this live training you will complete different a hands-on real-world incident response and learn concepts such as using threat intelligence, security monitoring, and utilizing threat analysis and incident response methodologies.
You will learn the key tenets and fundamentals of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, exploitation, and post-exploitation techniques..
More than 5 hours of video instruction to help you perform ethical hacking, penetration testing, and security posture assessment through compromising, analyzing, and mitigating web application vulnerabilities.
Provides step-by-step, real-life scenarios for performing security assessments (penetration testing) through web application vulnerabilities.
Provides step-by-step real-life, advanced scenarios of performing security assessments (penetration testing) of wireless networks and how to perform security posture assessments of IoT technologies and solutions. You also learn how to perform security posture assessments of mobile devices, such as smartphones, tablets, and wearables.
Learn how to perform web app testing, internal network testing, privilege escalation, password cracking, and data exfiltration to probe for and mitigate enterprise vulnerabilities. The course concludes with a look at reporting and evaluation methods to ensure that your enterprise environment stays secure from ever-evolving threats and security vulnerabilities.