Tutelr Infosec Private Limited
Certification in Hacker Tools, Techniques&handling
IT & Software (Computer Science & IT)
Shortlisted by 104+ Students
Location: Chennai
Duration: 3 MONTH
Regular / Offline
Average Fees: ₹ 25000
Highlights The TIAC Incident Handler certification validates a practitioner’s ability to detect, respond, and resolve computer security incidents using a wide range of essential security skills. TCEH certification holders have the knowledge needed to manage security incidents by understanding common attack techniques, vectors and tools, as well as defend against and respond to such attacks when they occur. • Incident Handling and Computer Crime Investigation • Computer and Network Hacker Exploits • Hacker Tools (Nmap, Nessus, Metasploit and Netcat)
Syllabus
SECTION 1: Incident Response and Cyber Investigations
TOPICS: Incident Response; Digital Investigations; Live Examination; Network Investigations; Memory Investigations; Malware Investigations; Cloud Investigations; Bootcamp: Linux Olympic
SECTION 2: Recon, Scanning, and Enumeration Attacks
TOPICS: MITRE ATT&CK Framework Introduction; Open-Source Intelligence; DNS Interrogation; Website Reconnaissance; Network and Host Scanning with Nmap; Cloud Spotlight: Cloud Scanning; Enumerating Shadow Cloud Targets; Server Message Block (SMB) Sessions; Defense Spotlight: DeepBlueCLI
SECTION 3: Password and Access Attacks
TOPICS: Password Attacks; Understanding Password Hashes; Password Cracking; Defense Spotlight: Domain Password Audit Tool (DPAT); Cloud Spotlight: Insecure Storage; Multi-Purpose Netcat
SECTION 4: Public-Facing and Drive-By Attacks
TOPICS: Metasploit Framework; Drive-By Attacks; Defense Spotlight: System Resource Usage Monitor; Command Injection; Cross-Site Scripting (XSS); SQL Injection; Cloud Spotlight: SSRF and IMDS Attacks
SECTION 5: Evasion and Post-Exploitation
TOPICS: Endpoint Security Bypass; Pivoting and Lateral Movement; Hijacking Attacks; Covering Tracks; Establishing Persistence; Defense Spotlight: Real Intelligence Threat Analytics; Data Collection; Cloud Spotlight: Cloud Pos tExploitation; Where to Go from Here
SECTION 6: Capture-the-Flag Event
TOPICS: Target Discovery and Enumeration; Applying Open Source Intelligence and Reconnaissance Information Gathering; Public-Facing Asset Compromise; Email Compromise; Attacking Windows Active Directory; Password Spray, Guessing, and Credential Stuffing Attacks; Post Exploitation Pivoting and Lateral Movement; Choosing, Configuring, and Delivering Exploits; Internal Attacker Compromise Attribution
How Promilo Works for Students
College Search Made Easy, Find the Right College for You in Minutes, Not Months!
Search your Career Goal
Discover courses, internships, and jobs that sync with your goals.
Register for Free
Get access to premium features and connect directly with experts. You're all set!
Book a Free Meeting
Schedule a free online meeting or talk to experts Jump into a meeting with pro-experts. We got you!
Stack Up Rewards
Your time is valuable, and we appreciate every moment you spend with us. That's why we continue to reward you for your engagement.