Cyber Security for IT & SOC Teams. 12 day online course.

Adapt Your IT & SOC teams performances to a new and volatile Cyber Reality


Ring til IDG Kurser på 77 300 123
eller mail på
for nærmere info angående datoer.


The COVID-19 pandemic has forced many organizations to shift their workforce to a full work-from-home model, and move their operational activities to the digital world.
This situation has, in turn, left them more vulnerable to Cyber Attacks. Today, more than ever, IT and SOC teams must remain on high alert and be ready to fully implement new remote work practices, while maintaining defenses and protecting data from malicious attacks. The teams MUST work together to keep the company safe.
In this course, we offer your IT and SOC teams the best tools and techniques needed to adapt their performance to a new and volatile cyber reality. The students will introduce with the different ways to perform manipulation and bypass security measures in order to gain access to a sensitive service/information.

12 day online course from 9:00 - 12:30

The teacher – Idan Stambulchik

Idan is the Head of Content and a global Cyber Security Instructor at HackerU. Idan Is bachelor in Management Information System with a demonstrate history of working in the cyber security industry. Hands-on experience as a penetration tester that find different vulnerabilities in websites and mobile application. Idan is an expert in Web Application Penetration Testing and Python Programming for Security. As an instructor Idan has a worldwide experience both frontal and online courses in Israel, India and Europe counting governments, businesses etc.

Course goals and objectives:

  • Understanding the cyber-attack lifecycle to better defend your organization.
  • Helping IT and security teams in building and maintaining a secure network and system in the organization.
  • Help IT and security teams in implementing strong access control measures.
  • Helping Tier 1 SOC analysts in the process of upgrading to Tier 2 SOC analysts

Course Preparations:

  • A week before the beginning of the course, participants will be asked to join HackerU LMS, which will contain all course materials, labs and access to the live training.
    Participants will receive a link with a group code, and once approved by HackerU team, will be able to log in.
    At the day of training HackerU operations team will be available to assist in any login/technical problem.
  • It is participants’ responsibility to have a strong internet connection, headset & webcam.

Kurset henvender sig til

Target Audience Recommendations:
IT Professionals with at least 3 years of hands-on experience. SOC Analysts with at least 1 year and half of hands-on experience. Anyone who wish to defend the organization, with a hands-on experience of both Linux and Windows operation system.


This course is designed for people with an IT background skill and Experience with both Linux and Windows operation system.


Day 1: 2/12/2020

Module 01
- Virtualization

  • What is Virtualization
  • Hypervisors
  • Virtual Environment Setup
  • Virtualized Hardware
  • Virtualization Maintenance
  • Advanced Virtualization

Module 02
– Intro to Linux & Users and Permissions

  • Introduction to Linux
  • Distributions
  • File System
  • Users
  • Basic Commands
  • Editing Files
  • Linux Operators
  • Filtering Output
  • User & Group Management
  • Permissions
  • Su & Sudo
  • Monitoring Resources

Day 2: 7/12/2020

Module 03
– Linux Network Configuration & Package Management

  • Configure Network Settings
  • Network Troubleshooting
  • Debian Packages
  • Apt Packages
  • Package Management
  • Install Repository
  • Apache2
  • Telnet
  • SSH
  • FTP
  • SMB
  • SFTP

Day 3: 9/12/2020

Module 4:
Cyber Kill Chain

  • What is Information Security
  • Terminology
  • Types of Hackers
  • Hacker State of Mind
  • World of Security
  • Operation systems

Module 05
: Brute Force

  • Password Cracking
  • Passwords and hashes
  • Attack Vectors
  • Brute Force Tools
  • Dictionary Attack
  • Automation Tools

Day 4: 14/12/2020

Module 6
: DFIR Fundamentals

  • DFIR Fundamentals
  • Image Capture
  • Memory Capture
  • Forensics Tools
  • Forensic Methodologies

Day 5: 16/12/2020

Module 7
: SOC Life Cycle

  • SOC Fundamentals
  • SOC Team Responsibilities
  • Incident Prioritization
  • Vulnerability Assessment

Module 8
:  Utilizing SOAR in a SIEM Environment

  • SOAR
  • Automation Objectives
  • Successful Defense
  • Effective Usage
  • Demisto

Day 6: 21/12/2020

Module 9:
  Malware Analysis & Reverse Engineering – Static Analysis

  • Malware Analysis Introduction
  • Enumeration Techniques & Common Scanners
  • Portable Executable
  • Dynamic Link Library

Module 10:
Malware Analysis & Reverse Engineering – Dynamic Analysis

  • Dynamic Analysis Introduction
  • System Monitoring
  • Networking Monitoring
  • Malware Samples

Day 7: 6/01/2021

Module 11:
Reversing with IDA

  • Introduction to IDA
  • IDA Code Flow
  • Documentation Options
  • Patching with IDA

Day 8: 11/01/2021

Module 12
: PowerShell

  • PowerShell Fundamentals
  • PowerShell ISE
  • PowerShell Modules
  • PowerCat & Nishang
  • PowerShell to EXE

Day 9: 13/01/2021

Module 13
: Privilege Escalation

  • Windows Privileges
  • Domain Privileges
  • Windows Boot Process
  • Exploitation
  • Windows Defender ATP
  • Means of Protection

Day 10: 18/01/2021

Module 14
: Bypass SIEM Detection

  • Detection Fundamentals
  • Detection Bypass methodologies & Tools
  • External Bypass
  • Internal Bypass

Module 15
: Obfuscation

  • What is Obfuscation?
  • Types of Obfuscation
  • Packing
  • Various Tools
  • Tools Comparison
  • Multi-Layered Obfuscation

Day 11: 20/01/2021

Module 16:
Threat Hunting Vs Threat Intelligence

  • Threat Hunting
  • Threat Intelligence
  • Hunts and Cycles
  • Manual Threat Hunting
  • Threat Hunting Automation
  • Threat Hunting with Zeek

Module 17:

  • ELK Components
  • ELK installation & Configuration
  • ELK Functions
  • Threat Hunting with ELK

Day 12: 25/01/2021

Module 18:
Office Exploitation

  • VBA & Macro Injection
  • DDEAUTO Word Exploitation
  • CSV Injection
  • PowerPoint Exploitation
  • Social Engineering with SFX
  • Full Review over all the modules.

Praktiske oplysninger
kr. 33.750,- (ekskl. moms)
online course from 9:00 - 12:30


Ring til IDG Kurser på 77 300 123
eller mail på
for nærmere info angående datoer.

Er I flere fra samme virksomhed, som skal på kursus? Så kan der være penge at spare med et virksomhedskursus

Læs mere om virksomhedskurser her

Andre populære kurser


Schrems II: Praktisk indføring i sagen og sikring af compliance.
På dette kursus fører Schrems II-ekspert, advokat Martin Folke Vasehus, dig gennem en række praktiske forhold ved Schrems II – og klarlægger, hvordan du kan sikre, at dine data-overførsler ikke er ulovlige.
Læs mere og tilmeld dig her

Excel Udvidet - online kursus
Mere om formler, funktioner, betinget format og datavalidering.
Læs mere og tilmeld dig her

Makroer i Excel - online kursus

Lær at benytte makroer til at spare tid, undgå fejl og automatisere processer i Excel. Det er ikke et kursus i VBA, men et kursus i makroer.
Læs mere og tilmeldt dig her

Kursuslokaler udlejes med og uden PC
Har du brug for et undervisningslokale med plads til op til 15 deltagere, så kan vi tilbyde fuldt udstyrede lokaler. Pris pr. dag 3.500.- kr. Forplejning 200.- kr. pr. person pr. dag.
Inkl. i prisen er teknisk support og service. Interesseret?
Kontakt os på telefon 77 300 123 og hør mere.

Hørkær 18
2730 Herlev
Tlf: 77 300 123
CVR: 65970414