MMSCYBER004: Hacking Techniques and Exploits (3 Days)


Our Hacker Techniques and Exploits course will teach students the fundamentals of how to think like a hacker and how to use hacking techniques against modern security vulnerabilities.

This course is designed for users with basic security skills who are looking to master core concepts of hacking techniques and exploits. Students will obtain an in-depth understanding of network infrastructure and systems security in order to understand how to infiltrate and bypass them.

Our extensive cyber lab environment will replicate real-world scenarios that will give the students a practical understanding of how hackers plan and execute attacks against systems.

Students will master the foundations of hacking and understand what it takes to secure a system. Participants will be able to successfully detect, prevent, and respond to security threats at the conclusion of this course. Topics covered in this course include evading firewalls, Windows and Linux exploits, password cracking, and web-based exploitations.

After completing this course students will be able to:

  • Run Linux/Windows Exploits
  • Perform network scanning
  • Utilize password sniffing techniques
  • Perform security tests on web applications/webservers
  • Implement Reconnaissance, Footprinting and Social Engineering methodologies
  • Evade IDSs, Firewalls/AV and Honeypots
  • Create, understand, and apply various forms of malware
  • Utilize the most up to data hacking tools

Course Outline

Module One: Know, Prevent, Detect, Respond and Recover   

  1. Know
  2. Prevent
  3. Detection
  4. Respond
  5. Recover

Module Two: Incident Handling and Criminal Investigation         

  1. The incident Response Process
  2. The Incident Response Plans
    • Local Auditing
  3. Planning for Disaster and Recovery
  4. Evidence Handling and Administration
    • Evidence Handling
    • Lab
    • Additional Forensics tools and tricks
      1. Write blocking labs
      2. Forensics Imaging labs
      3. Data Recovery
      4. Data Overwriting
  5. Requirements of Regulated Industries

Module Three: Computer and Network Hacking and Exploits

  1. Ethical Hacking
  2. Legal System
  3. Reconnaissance, Footprinting and Social Engineering
    • Google Hacking, Scanning, Proxies, and Ping
  4. Social Engineering Toolkit (SET)
    • Phishing and Password capture with SET
  5. Evading IDSs, Firewalls/AV and Honeypots
  6. Anti-virus bypass
    • IDS Evasion
  7. Linux Exploits
  8. Windows Exploits

Module Four: Hacking Techniques and Defense

  1. Hacker Tools and Techniques Underground Sites & Hacking Groups
  2. Password Cracking
  3. Sniffing
  4. Trojans, Viruses, Worms and Covert Channels (Insidious Attack)
  5. Denial of Service
  6. Session Hijacking
  7. Web Servers and Web Applications
  8. Wireless Network Hacking
  9. Detecting Intrusions

Module Five: Hacker Tools Workshop 

  1. Backdoor Lab
  2. Encrypt Your Email
  3. Pentest Box