Search Website

Validating credentials, please wait...
  • General Inquiries 1-571-481-9307

  • Fax 1-202-315-3003

Home

   

Cyber Professionals

   

Systems Exploits and Intrusion Detection

Systems Exploits and Intrusion Detection

Systems Exploits and Intrusion Detection

$2,500.00

The 4-day Systems Exploits and Intrusion Detection course is designed to provide a solid foundation that covers both the defensive and offensive aspects of cybersecurity. While there are many niches within the realm of cybersecurity, detection, prevention, and response should define the core purpose of any successful information security program. During this hands-on workshop, students will learn fundamentals of the relevant technologies and methods used to counter the most prevalent threats of this day.

Out of stock

Share with friends:

Description

The 4-day Systems Exploits and Intrusion Detection course is designed to provide a solid foundation that covers both the defensive and offensive aspects of cybersecurity. While there are many niches within the realm of cybersecurity, detection, prevention, and response should define the core purpose of any successful information security program. During this hands-on workshop, students will learn fundamentals of the relevant technologies and methods used to counter the most prevalent threats of this day.

Prerequisites

This class is intended for individuals with basic knowledge of information systems and methods used to conduct risk assessments.

Modules
  • Module 1 – Laying the Foundation
  • Module 2 – Intrusion Detection & Prevention
  • Module 3 – Vulnerabilities & Exploits
  • Module 4 – Cyber Warfare Illustrated
  • Module 5 – Wrapping it Up
In the course, students will learn:
  • Networking Concepts
  • Security Concepts
  • Incident Response & Investigation
  • Intrusion Detection & Prevention
  • Vulnerabilities & Exploits
  • Cyber Warfare Illustrated
  • Basic Concepts & Principles
  • Technologies
  • SIEM Technology
  • DOD Host-Based Security System (HBSS)
  • Center for Internet Security Top 20 Security Controls
  • OWASP Top 10
  • Reconnaissance
  • Gaining Access
  • Privilege Escalation
  • Maintaining Access
  • Exfiltration & Obfuscation
  • Sources of & Motivations for Attack
Certification

Every student participating will receive a certificate of successful participation in this course, which will allow you to claim hours of Continuous Professional Experience for your existing certifications.

Continuing Professional Education Units (CPEUs) Earned (hours): 32