Cyber Warfare: HANDS-ON DEFENSE AND COUNTER-OFFENSE

This post is also available in: English

HANDS-ON DEFENSE AND COUNTER-OFFENSE

Duration : 40 Hours

 

The Hands-On Defense and Counter-Offense course is almost entirely practical with many hands-on activities. The training covers new strategies for defenders, and a deeper understanding of who is the attacker and why he attacks. The performed exercises will enable students to quickly and easily implement the learnt skills in their own working environment.

Target Audience

  • General security practitioners
  • Penetration testers
  • Ethical hackers
  • Web application developers
  • Website designers and architects

Pre- requisites

  • Basic understanding of Windows and Linux Command line
  • Basic TCP/IP understanding.

Course Outline

Module 1: Setup and Baseline

  • Setup
  • Bad Guy Defenses
  • Basics and Fundamentals (Or, Don’t Get Owned Doing This)
  • Playing With Advanced Backdoors
  • Software Restriction Policies
  • Legal Issues
  • Venom and Poison

Module 2: Annoyance

  • How to Connect to Evil Servers (Without Getting Shot)
  • py
  • Recon on Bad Servers and Bad People
  • Honeypots
  • Honeyports
  • Kippo
  • Deny Hosts
  • Artillery
  • More Evil Web Servers
  • Cryptolocked

Module 3: Attribution

  • How to Connect to Evil Servers (Without Getting Shot)
  • py
  • Recon on Bad Servers and Bad People
  • Honeypots
  • Honeyports
  • Kippo
  • Deny Hosts
  • Artillery
  • More Evil Web Servers
  • Cryptolocked

Module 4: More Attribution and Attack

  • Nova
  • Infinitely Recursive Windows Directories
  • Web Application Street Fighting with BeEF!
  • Wireless and Brotherly Love
  • Evil Java Applications with SET
  • AV Bypass (for the Good Guys!)
  • Arming Word Documents
  • Python Injection
  • Ghostwriting
  • HoneyBadger
  • Let’s Try to Trojan Some Java Applications