Loading...
0

Introduction to Hacking, Defense and Response

SEC300

Course Description

This course provides a comprehensive overview of hacking and cybersecurity defense and response tools and techniques. It incorporates several hands-on exercises utilizing the same attack methods used by hackers and cybersecurity professionals. The course starts with a discussion of why people hack and how they hack. It then focuses on the methods used, including the initial foot printing of the target, scanning the network and finally enumerating target host machines. The second day focuses on the measures necessary to protect your network from the threat. Topics include understanding your network traffic, firewalls, host hardening, intrusion detection systems and network design. Tools used for this class include: Nessus, Nmap, SuperScan, Snort, Fport, John the Ripper, and many others.

Introduction to Hacking, Defense and Response Dec 2025

Introduction to Hacking, Defense and Response

HackersHacker OverviewAre you a target?Hack ProfilesAttack Sophistication DiagramHow do they do it?
Hacker Overview
Are you a target?
Hack Profiles
Attack Sophistication Diagram
How do they do it?
Foot printingOpen Source Options – WhoisDNS
Open Source Options – Whois
DNS
Lab Exercise
ScanningNetwork ScanningPort ScanningTypes of TCP ScansUDP ScanningWhat are they looking for?
Network Scanning
Port ScanningTypes of TCP ScansUDP Scanning
Types of TCP Scans
UDP Scanning
What are they looking for?
Lab Exercise
Enumeration, Gaining Access, Escalating Privileges, Covering Traps, Creating BackdoorsEnumerating Accounts, Shares, System InformationGaining Access – Password CrackingPilferingCovering TrapsCreating Backdoors
Enumerating Accounts, Shares, System Information
Gaining Access – Password Cracking
Pilfering
Covering Traps
Creating Backdoors
Lab Exercise
Denial of Service, Social Engineering, Google HackingDenial of ServiceSocial EngineeringGoogle Hacking
Denial of Service
Social Engineering
Google Hacking
Web Based AttacksSQL InjectionCross Site Scripting
SQL Injection
Cross Site Scripting
Lab Exercise
Finishing UpHow to Protect YourselfHelpful Links
How to Protect Yourself
Helpful Links
Lab Exercise

SEC200 Security Architecture and Controls,
TCP/IP Fundamentals or equivalent

Night

$95000

  • Date
  • Days of the Week
  • Time
  • Duration
  • Hours/CEUs
  • Jan 05 - Jan 14, 2026
  • Mon,Wed
  • 5:30 PM - 8:30 PM (CST)
  • 4 Nights
  • 12 hours / 1.2 CEUs
Add to cart arrow

Night

$95000

  • Date
  • Days of the Week
  • Time
  • Duration
  • Hours/CEUs
  • Mar 10 - Mar 19, 2026
  • Tue,Thu
  • 5:30 PM - 8:30 PM (CST)
  • 4 Nights
  • 12 hours / 1.2 CEUs
Add to cart arrow

Night

$95000

  • Date
  • Days of the Week
  • Time
  • Duration
  • Hours/CEUs
  • Jun 16 - Jun 25, 2026
  • Tue,Thu
  • 5:30 PM - 8:30 PM (CST)
  • 4 Nights
  • 12 hours / 1.2 CEUs
Add to cart arrow

Night

$95000

  • Date
  • Days of the Week
  • Time
  • Duration
  • Hours/CEUs
  • Sep 14 - Sep 23, 2026
  • Mon,Wed
  • 5:30 PM - 8:30 PM (CST)
  • 4 Nights
  • 12 hours / 1.2 CEUs
Add to cart arrow

Night

$95000

  • Date
  • Days of the Week
  • Time
  • Duration
  • Hours/CEUs
  • Nov 09 - Nov 18, 2026
  • Mon,Wed
  • 5:30 PM - 8:30 PM (CST)
  • 4 Nights
  • 12 hours / 1.2 CEUs
Add to cart arrow

Our Testimonials

"We equip professionals with in-demand skills, strategically aligning our courses with industry needs and ensuring our curriculum reflects the latest technologies."

Katherine with comp
Katherine Cain Executive Director

Our Training Partners