Skip to main content

Hacker Methodologies for Security Professionals

This course provides a flexible methodology for use in emulating external and internal network intrusion threat vectors.

Request Course Details

Attending students will learn

  • Impact and Relevance of Today's Cyber Attacks
  • Reconnaissance Techniques Used by Most Intruders
  • Network, Host and Service Discovery Methods
  • Processes Employed to Enumerate System and User Information
  • How System Vulnerabilities are Identified
  • Multiple Tactics Used to Penetrate Systems
  • Various Techniques to Escalate System Privileges
  • Password Cracking

Who should attend

  • Incident Responders who need to understand and react to IDS alerts
  • Network Defenders seeking to understand Common Access Methods
  • Security Managers who desire to improve their Defensive Model
  • Security Operations Center Staff seeking to identify signs of compromise
  • New members of Penetration Testing and Vulnerability Assessment Teams


Although no specific courses are required, students should have some level of experience with Microsoft Windows and Linux operating systems as well as a basic understanding of TCP/IP networking.

Course Outline

1. Footprinting

  • WHOIS and DNS Enumeration
  • DNS Interrogation
  • Open Source INTelligence (OSINT)

2. Scanning

  • Host Discovery
  • Service Discovery

3. Enumeration

  • Banner Grabbing
  • Operating System Detection
  • Vulnerability Scanning

4. Web Hacking

  • Web Application Architecture
  • HTTP(S) Primer
  • Discovery
  • Configuration Management
  • Authentication
  • Authorization
  • Session Handling
  • Data Validation
  • OWASP Top 10

5. System Hacking (Windows)

  • Domain Enumeration
  • User Enumeration
  • Penetration
  • Privilege Escalation
  • Pillaging
  • Expanding Influence
  • Local Access

6. System Hacking (Unix)

  • User Enumeration
  • Penetration
  • Privilege Escalation
  • Pillaging
  • Expanding Influence
  • Local Access

Courses That Follow This Course

Request More Info About This Course

contact Focal Point

tweets by @FocalPointDR

Loading Tweets...