Professional Documents
Culture Documents
Watch now
Quizzes
Practice exams
Accountability coaching
Erik Choron
Nugget trainer since 2022
Read the full bio
Read Reviews
Videos Transcripts
It's a cliche to claim that the best defense is a strong offense, but in the case of digital security
it's a cliche that's as true as it's ever been. One of the most fundamental skills a security
administrator can gain is an understanding of the tools that hostile actors use to penetrate
CBT Nuggets uses cookies to give you the best experience on our website. You can read more about
networks and extract valuable to use the site as you normally would if you agree.
information. Chat with an Expert
our use of cookies, or just continue
This training on hacker tools, techniques and incident handling is about recognizing theto
Talk Sign
Pricing
sales
strengths and limitations of tools that will be deployed against you and your network so that up
you can prevent them before they occur, stop them when they do, and understand what
happened afterward.
After finishing the videos in this SEC504 training, you'll know how to detect and respond to
threats that your company will inevitably face in the digital realm, deploying a dynamic
response according to the attack.
For anyone who leads an IT team, this Cyber Security training can be used to onboard new
security admins, curated into individual or team training plans, or as a Cyber Security reference
resource.
New or aspiring security admins. Taking a course like this in hacker tools, techniques, and
incident handling is a little bit like taking cooking classes from Gordon Ramsey before you've
moved past Mac 'n Cheese in your cooking ability. You'll learn a ton, but a lot of what you'll
learn is a way of thinking about cybersecurity that can eventually be applied to your career.
Experienced security admins. A security administrator with about five years of experience is
the perfect audience for this course in hacker tools, techniques, and incident handling. At that
point in your career, you're leaving behind the rote button-clicking and report-running of an
early-career and approaching the dynamic, threat anticipation of a security engineer. Use this
course to launch yourself into a more exciting and fulfilling cybersecurity career.
Show less
Skill:
Incident Response
1. Incident response
CBT Nuggets uses cookies to give you the best experience on our website. You can read more about
1 min
our use of cookies, or just continue to use the site as you normally would if you agree. Chat with an Expert
2. Incident Handling Process Talk to Sign
Pricing
7 mins sales up
4. Event Detection
6 mins
6. Writing Everything Up
8 mins
Skill:
Digital Investigations
Skill:
Live Examination
Skill:
Network Investigations
Skill:
Memory Investigations
Skill:
Malware Investigations
Skill:
Cloud Investigations
Skill:
Federal Rules of Evidence
CBT Nuggets uses cookies to give you the best experience on our website. You can read more about
our use of cookies, or just continue to use the site as you normally would if you agree. Chat with an Expert
Skill: Talk to Sign
Pricing
MITRE ATT&CK Framework Introduction sales up
Skill:
Open-Source Intelligence
Skill:
DNS Interrogation
Skill:
Website Reconnaissance
Skill:
Network and Host Scanning with Nmap
Skill:
Enumerating Shadow Cloud Targets
Skill:
Server Message Block (SMB) Sessions
Skill:
Defense Spotlight: DeepBlueCLI
Skill:
Password Attacks
Skill:
Microsoft 365 Attacks
Skill:
Understanding Password Hashes
Skill:
Password Attack Examples
Skill:
Cloud Spotlight - Insecure Storage
Skill:
Multi-Purpose Netcat
Skill:
CBT Nuggets uses cookies to give you the best experience on our website. You can read more about
Metasploit
our Framework
use of cookies, or just continue to use the site as you normally would if you agree. Chat with an Expert
Skill: Talk to Sign
Pricing
Drive-By Attacks sales up
Skill:
Defense Spotlight: System Resource Usage Monitor
Skill:
Command Injection
Skill:
Cross-Site Scripting (XSS)
Skill:
Cloud Spotlight - SSRF and IMDS Attacks
Skill:
Endpoint Security Bypass
Skill:
Pivoting and Lateral Movement
Skill:
Hijacking Attacks
Skill:
Covering Tracks
Skill:
Establishing Persistence
Skill:
Data Collection
Skill:
Attacking Windows Active Directory
Skill:
Password Spray, Guessing, and Credential Stuffing Attacks
CBT Nuggets uses cookies to give you the best experience on our website. You can read more about
our use of cookies, or just continue to use the site as you normally would if you agree. Chat with an Expert
Talk to Sign
Pricing
Train free for a week. sales up
Follow us
Let's chat!
Sales | Support |
General
CBT Nuggets uses cookies to give you the best experience on our website. You can read more about
our use of cookies, or just continue to use the site as you normally would if you agree. Chat with an Expert
© 2023 CBT Nuggets. All rights reserved. Talk to Sign
Pricing
sales
Terms | Privacy Policy | Accessibility | Sitemap | 2850 Crescent Avenue, Eugene, OR
up
97408 | 541-284-5522
CBT Nuggets uses cookies to give you the best experience on our website. You can read more about
our use of cookies, or just continue to use the site as you normally would if you agree. Chat with an Expert