


Responding to an incident of any size is a complex task. If you are unfamiliar with Linux, please view this short Intro to Linux video to help get you started. How to develop an incident handling process and prepare a team for battle.Application-level vulnerabilities, attacks, and defenses.Strategies and tools to detect each type of attack.How to understand and use hacking tools and techniques.How to recover from computer attacks and restore systems for business.How to ensure that attackers do not return.The latest computer attack vectors and how you can stop them.How to identify active attacks and compromises.Proactive and reactive defenses for each stage of a computer attack.The step-by-step approach used by many computer attackers.How to best prepare for an eventual breach.General security practitioners, system administrators, and security architects will benefit by understanding how to design, build, and operate their systems to thwart attacks. The course is particularly well-suited to individuals who lead or are a part of an incident handling team. Applying these skills in your own organization will enable you to discover the flaws in your system before the bad guys do!

Finally, students will participate in a hands-on workshop that focuses on scanning, exploiting, and defending systems. Instead of merely teaching a few hack attack tricks, this course provides a time-tested, step-by-step process to respond to computer incidents and a detailed description of how attackers undermine systems so you can prevent, detect, and respond to them. It addresses the latest cutting-edge insidious attack vectors, the "oldie-but-goodie" attacks that are still prevalent, and everything in between. This course will enable you to turn the tables on computer attackers by helping you understand their tactics and strategies, providing you with hands-on experience in finding vulnerabilities and discovering intrusions, and equipping you with a comprehensive incident handling plan. As defenders, it is essential we understand these hacking tools and techniques. From the hundreds to thousands of daily probes against your Internet infrastructure to the malicious insider slowly creeping through your most vital information assets, attackers are targeting your systems with increasing viciousness and stealth. If your organization has an Internet connection or one or two disgruntled employees (and whose doesn't!), your computer systems will get attacked. The Internet is full of powerful hacking tools and bad guys using them extensively. Immediately apply the skills and techniques learned in SANS courses, ranges, and summits
