Catalogue
detail

Catalogue
detail

TECHNOLOGIE DE L'INFORMATION

TECHNOLOGIE DE L'INFORMATION

Système d'information

Système d'information

Catalogue
detail

TECHNOLOGIE DE L'INFORMATION

Système d'information

SEC504: HACKER TOOLS, TECHNIQUES, AND INCIDENT HANDLING

Catégorie

TECHNOLOGIE DE L'INFORMATION

Sous-catégorie

Système d'information

Code

SIF027

Objectifs de la formation

Apply a dynamic approach to incident response.

Identify threats using host, network, and log analysis.

Implement best practices for effective cloud incident response.

Master cyber investigation processes using live analysis, network insight, and memory forensics.

Implement defense strategies to protect critical assets.

Understand attacker techniques to evade endpoint detection tools.

Identify how attackers exploit complex cloud vulnerabilities.

Analyze attacker steps for internal discovery and lateral movement after an initial compromise.

Recognize the most effective attacks to bypass system access controls.

Identify sophisticated techniques used by attackers and learn how to counter them effectively.

Programme de la formation

Public cible

Engineers • System administrators • Technical security managers • CND analysts • Security monitoring specialists • Cyber threat investigators

Durée (Jours)

6

Nombre de place min

5

Nombre de place max

5

Formateur

SANS

Create a free website with Framer, the website builder loved by startups, designers and agencies.