• Classroom
  • Online, Instructor-Led

Learning Objectives

  • Identify the classes of hackers, their motivations, and the methodologies employed by threat actors
  • Use publicly available tools and open source intelligence techniques to develop a target footprint
  • Scan and enumerate targets to identify underlying operating systems and services
  • Research and leverage exploits for vulnerable services to achieve access to target systems
  • Identify system configuration weaknesses and viable privilege escalation tactics
  • Analyze exploited systems to identify and remove indicators of compromise
  • Employ system tools to exploit additional targets within an internal system

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):