Technical Support Specialist Training
Rated 3.5/5 based on 11 customer reviews

Technical Support Specialist Training

Available: In Stock
$198.00

Image

Training Formats:      Instructor-Led, Self-Paced

Duration:        6 Days

Activities/Labs:

 

  • Analyze Malicious Network Traffic
  • Analyze SQL Injection Attack
  • Applying Filters to TCPDump and Wireshark
  • Auditing Service Accounts
  • Auditing Service Accounts and Setting Up Automated Log Collection
  • Baseline Systems in Accordance with Policy Documentation
  • Block Incoming Traffic on Known Port
  • Blue Team - Patch Analyst (DEMO LAB)
  • Comparing Controls
  • Conduct Root Cause Analysis for System Crashes
  • Conduct Supplemental Monitoring
  • Control Assessment and Evaluation
  • Creating a List of Installed Programs, Services and User Accounts from a WIN2K12 Server
  • Denial of Service PCAP Analysis
  • Dynamic Malware Analysis
  • Event Log Collection
  • Firewall Setup and Configuration
  • Host Identification Scanning with Linux
  • Host Identification Scanning via Windows
  • Identify Access to a LINUX Firewall Through SYSLOG Service
  • Implement Single System Changes in Firewall
  • Installing Patches and Testing Software
  • Intro to Linux - Routing and SSH Tunnels
  • LNX101 - OpenSSH Installation, Configuration, and Hardening
  • LNX101 - Setting Up a Firewall With UFW and Firewalled
  • LNX101 - Telnet vs. SSH
  • Manual Vulnerability Assessment
  • Manually Analyze Malicious PDF Documents
  • Manually Analyze Malicious PDF Documents 2
  • Monitoring and Verifying Management Systems
  • Network Segmentation (FW/DMZ/WAN/LAN)
  • Network Topology Generation
  • PAM Lab
  • Parse Files Out of Network Traffic
  • Participate in Attack Analysis Using Trusted Tool Set
  • Patches and Updates
  • Patching With WSUS
  • Post Incident Service Restoration
  • Preliminary Scanning
  • Protect Against Beaconing
  • Recover from Incident
  • Rogue Device Identification and Blocking
  • Scanning From Windows
  • Scanning with Nmap
  • Securing Linux - Firewalls
  • Securing Linux for System Administrators
  • Setting Up SYSLOG Forwarding From a Windows System
  • Setting Up Zones in a Firewall
  • Snort Signatures, IDS Tuning, and Blocking
  • System Hardening
  • Threat Designation
  • Tweaking Firewall Rules for Detection
  • Use pfTop to Analyze Network Traffic
  • Using Snort and Wireshark to Analyze Traffic
  • Verifying Hotfixes
  • Vulnerability Analysis/Protection
  • Windows Event Log Manipulation via Windows Event Viewer
  • Wireshark

Training Formats:      Instructor-Led, Self-Paced

Duration:        6 Days

Activities/Labs:

 

  • Analyze Malicious Network Traffic
  • Analyze SQL Injection Attack
  • Applying Filters to TCPDump and Wireshark
  • Auditing Service Accounts
  • Auditing Service Accounts and Setting Up Automated Log Collection
  • Baseline Systems in Accordance with Policy Documentation
  • Block Incoming Traffic on Known Port
  • Blue Team - Patch Analyst (DEMO LAB)
  • Comparing Controls
  • Conduct Root Cause Analysis for System Crashes
  • Conduct Supplemental Monitoring
  • Control Assessment and Evaluation
  • Creating a List of Installed Programs, Services and User Accounts from a WIN2K12 Server
  • Denial of Service PCAP Analysis
  • Dynamic Malware Analysis
  • Event Log Collection
  • Firewall Setup and Configuration
  • Host Identification Scanning with Linux
  • Host Identification Scanning via Windows
  • Identify Access to a LINUX Firewall Through SYSLOG Service
  • Implement Single System Changes in Firewall
  • Installing Patches and Testing Software
  • Intro to Linux - Routing and SSH Tunnels
  • LNX101 - OpenSSH Installation, Configuration, and Hardening
  • LNX101 - Setting Up a Firewall With UFW and Firewalled
  • LNX101 - Telnet vs. SSH
  • Manual Vulnerability Assessment
  • Manually Analyze Malicious PDF Documents
  • Manually Analyze Malicious PDF Documents 2
  • Monitoring and Verifying Management Systems
  • Network Segmentation (FW/DMZ/WAN/LAN)
  • Network Topology Generation
  • PAM Lab
  • Parse Files Out of Network Traffic
  • Participate in Attack Analysis Using Trusted Tool Set
  • Patches and Updates
  • Patching With WSUS
  • Post Incident Service Restoration
  • Preliminary Scanning
  • Protect Against Beaconing
  • Recover from Incident
  • Rogue Device Identification and Blocking
  • Scanning From Windows
  • Scanning with Nmap
  • Securing Linux - Firewalls
  • Securing Linux for System Administrators
  • Setting Up SYSLOG Forwarding From a Windows System
  • Setting Up Zones in a Firewall
  • Snort Signatures, IDS Tuning, and Blocking
  • System Hardening
  • Threat Designation
  • Tweaking Firewall Rules for Detection
  • Use pfTop to Analyze Network Traffic
  • Using Snort and Wireshark to Analyze Traffic
  • Verifying Hotfixes
  • Vulnerability Analysis/Protection
  • Windows Event Log Manipulation via Windows Event Viewer
  • Wireshark