Module 01 – THREATS AND ATTACKS
- Workbook (Pdf)
- Overview
- Threat Targets
- Threat Actors
- Threat Motives
- Threat Intentions
- Attack Phases
- Attack Vectors
- Technique Criteria
- Impact Of Attacks
- Footprinting
- Network And Port Scanning
- Vulnerability Scanning
- Penetration Testing
- Web App Scanning
- Enumeration
- Review Quiz (Number of attempts allowed: Unlimited)
Module 03 – POST-EXPLOITATION
- Workbook (Pdf)
- Command And Control
- Data Exfiltration
- Pivoting
- Lateral Movement
- Persistence
- Keylogging
- Anti-Forensics
- Covering Your Tracks
- Review Quiz (Number of attempts allowed: Unlimited)
Module 05 – DATA COLLECTION AND ANALYSIS
- Workbook (Pdf)
- Network Data Collection And Analysis
- Host Data Collection And Analysis
- Anomaly Detection
- Indicators Of Compromise
- Log Analysis Tools
- Review Quiz (Number of attempts allowed: Unlimited)
Module 07 – VULNERABILITY ASSESSMENTS
- Workbook (Pdf)
- Common Vulnerable Areas
- Vulnerability Assessments
- Review Quiz (Number of attempts allowed: Unlimited)
Module 02 – GAINING ACCESS
- Workbook (Pdf)
- Exploitation Frameworks
- Client-Side Attacks
- Server-Side Attacks
- Mobile Threats
- Web Attacks
- Password Attack
- Wireless Attacks
- Social Engineering
- Man-In-The-Middle
- Malware
- Out-Of-Band Attacks
- Denial Of Service
- Review Quiz (Number of attempts allowed: Unlimited)
Module 04 – THREAT RESEARCH AND INCIDENT PREP
- Workbook (Pdf)
- Threat Research And Incident Prep
- Review Quiz (Number of attempts allowed: Unlimited)
Module 06 – INCIDENT RESPONSE TECHNIQUES
- Workbook (Pdf)
- Containment
- Asset Discovery
- Windows Incident Response Tools
- Linux Incident Response Tools
- Incident Response Process
- Incident Response Preparation
- Compliance And Standards
- Frameworks And Best-Practices
- Forensic Concepts
- Review Quiz (Number of attempts allowed: Unlimited)