SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling

Course Overview

This course will enable you to turn the tables on computer attackers by helping you understand their tactics and strategies, providing you with hands-on experience in finding vulnerabilities and discovering intrusions, and equipping you with a comprehensive incident handling plan. It addresses the latest cutting-edge insidious attack vectors, the "oldie-but-goodie" attacks that are still prevalent, and everything in between. Instead of merely teaching a few hack attack tricks, this course provides a time-tested, step-by-step process to respond to computer incidents and a detailed description of how attackers undermine systems so you can prevent, detect, and respond to them. Finally, students will participate in a hands-on workshop that focuses on scanning, exploiting, and defending systems. Applying these skills in your own organization will enable you to discover the flaws in your system before the bad guys do! The course is particularly well-suited to individuals who lead or are a part of an incident handling team. General security practitioners, system administrators, and security architects will benefit by understanding how to design, build, and operate their systems to thwart attacks.


  • SEC504.1: Incident Response and Computer Crime Investigations
  • SEC504.2: Recon, Scanning, and Enumeration Attacks
  • SEC504.3: Password and Access Attacks
  • SEC504.4: Public-Facing and Drive-By Attacks
  • SEC504.5: Evasion and Post-Exploitation Attacks
  • SEC504.6: Capture the Flag Event


In Person (6 days) / Online - Access Period: 4 months

Course Authors

  • Michael Murr, Principal instructor
  • Joshua Wright, Fellow

What You Will Learn

  • Over 1,000 slides of instruction with detailed notes
  • Step-by-step instructions in self-contained labs showing you how to employ these hacker tools and techniques
  • MP3 audio files of the complete course lecture