Hacking Tactic, Techniques, and Procedures (TTPs)

Posted By: lucky_aut

Hacking Tactic, Techniques, and Procedures (TTPs)
Published 9/2025
Duration: 14h 53m | .MP4 1920x1080 30 fps(r) | AAC, 44100 Hz, 2ch | 18.4 GB
Genre: eLearning | Language: English

Learning about Hackers and Their Tactics to Maximize Security

What you'll learn
- Define key threat and risk-related terms
- Identify and describe the primary categories of hackers (white hat, gray hat, black hat) and explain their ethical boundaries
- Recognize the different characteristics that define adversaries in the cybersecurity landscape, such as motivations, resources, sponsorship, and levels of sophi
- Explain the risks posed by insider threats and shadow IT and how these internal risks differ from external threats
- Explain how cyber attacks are planned and carried out.
- Describe Tactics, Techniques, and Procedures (TTPs) and how they reveal attacker behavior
- Understand the MITRE ATT&CK framework and how it organizes attack tactics and techniques
- List the steps of the Cyber Kill Chain and how it helps defend against attacks
- Describe the Diamond Model of Intrusion Analysis and how it helps analyze attacks
- Define what attack patterns and signatures are and how they are used to identify adversaries
- Explain the purpose of reconnaissance and how attackers gather information
- Describe OSINT techniques, including DNS and website reconnaissance, social media scraping, eavesdropping, and dumpster diving
- Define an attack surface and how it’s analyzed to find an attack vector and vulnerabilities that will be used during an attack
- Explain the concept of weaponization in cyber attacks and the role of brokers in malware distribution
- Identify common types of malware, including viruses, worms, trojans, ransomware, spyware, Command and Control (C2), Remote Access Trojans (RATs), botnets, and f
- Discuss enterprise-level concerns related to malware and strategies for mitigation
- Explain the role of social engineering in cyber attack delivery and how trust is developed with targets
- Identify and describe common social engineering methods and tactics, including impersonation, phishing variants, and physical techniques like tailgating
- Recognize advanced delivery techniques such as typosquatting, domain shadowing, and business email compromise (BEC)
- Understand the impact of emerging tools, including AI, on social engineering attacks
- Identify common vulnerabilities across networks, protocols, hardware, software, virtualization, cloud, cryptography, humans, passwords, processes, and physical
- Explain how different vulnerabilities can be exploited individually or combined through exploit chaining
- Describe techniques for network discovery, reconnaissance, and enumeration, including both wired and wireless methods
- Perform basic network scanning and fingerprinting using tools like Nmap and Wireshark
- Explain wiretapping and sniffing attacks and how they are used to capture network data
- Understand credential harvesting and vulnerability scanning as part of the attack lifecycle
- Explain the concepts of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks and their impact on network availability
- Identify various types of DoS attacks, including jamming, buffer overflow, ping of death, and TCP reset attacks.
- Describe network flooding attacks such as ping flood, TCP SYN flood, UDP flood, DNS flood, amplification, and reflected attacks.
- Demonstrate understanding of Wi-Fi deauthentication, DHCP starvation, and rogue DHCP attacks
- Understand the mechanics behind broadcast storms, directed broadcasts, and smurf attacks
- Explain what Adversary-in-the-Middle (AitM) and replay attacks are, including their impact on communications
- Identify various spoofing attacks, including DHCP spoofing, ARP cache poisoning, DNS cache poisoning, and evil twin attacks
- Understand how these attacks manipulate network traffic and deceive systems or users
- Identify common software vulnerabilities using frameworks like Common Weakness Enumeration (CWE) and OWASP Top 10.
- Explain different types of software attacks, including race conditions, deserialization, buffer overflow, path traversal, injection attacks, and cross-site scri
- Identify common authentication and credential-based attacks such as password attacks, credential replay, and MFA fatigue.
- Explain advanced access attacks including pass-the-hash, session hijacking, privilege escalation, and compromised key attacks
- Describe exploitation techniques like jailbreaking, sideloading, trust exploits, and request forgery attacks (CSRF, SSRF)
- Recognize physical attack vectors related to authentication and access control
- Explain password hashing and the importance of salting to protect stored passwords
- Demonstrate various password cracking methods, including brute-force, dictionary, mask attacks, and password spraying
- Understand advanced cracking tools like hashcat and hydra used for account compromise
- Recognize attacks such as rainbow tables, credential stuffing, and their impact on security
- Explain common stealth techniques used by attackers, including encryption, tunneling, and obfuscation
- Describe traffic manipulation methods such as traffic fragmentation and DNS tunneling
- Identify network evasion tools like proxies, fast-flux, double-flux, and domain-flux
- Understand how Domain Generation Algorithms (DGA) enable persistent and evasive communications
- Identify common indicators of compromise (IoCs), including alerts, logs, and signs of removed evidence or disabled defenses
- Recognize behavioral signs such as resource consumption issues, system crashes, and strange communications
- Detect suspicious activities like data exfiltration, rogue devices, scans, beaconing, and unauthorized changes
- Understand account anomalies including lockouts, new accounts, concurrent sessions, and impossible travel
- Analyze other unusual system behaviors that may indicate a security breach

Requirements
- A good understanding of computers
- A good understanding of networking

Description
This course provides a comprehensive overview of cybersecurity threats, vulnerabilities, and attack methodologies, equipping learners with the knowledge to identify, analyze, and respond to adversarial tactics. We begin by exploring key concepts like threat terminology, attacker motivations, and reconnaissance techniques used to gather critical information. From there, we dive into attack methodologies, including the use of Tactics, Techniques, and Procedures (TTPs), frameworks like MITRE ATT&CK, and models such as the Cyber Kill Chain and Diamond Model of Intrusion Analysis. Through hands-on demos and exercises, learners will understand how adversaries weaponize malware, deliver attacks via social engineering, and exploit system weaknesses to gain access and maintain persistence.

The course further examines advanced attack vectors such as denial of service, spoofing, software vulnerabilities, authentication attacks, and stealth techniques used to evade detection. Learners will develop skills to recognize indicators of compromise (IoCs), analyze unusual system behaviors, and understand attack patterns and signatures. Emphasizing practical tools and demonstrations—including network scanning, password cracking, and intrusion detection—this course prepares participants to anticipate, detect, and defend against evolving cyber threats effectively.

Key components of the course include:

Define key threat and risk-related terms

Identify and describe the primary categories of hackers (white hat, gray hat, black hat) and explain their ethical boundaries

Recognize the different characteristics that define adversaries in the cybersecurity landscape, such as motivations, resources, sponsorship, and levels of sophistications

Explain the risks posed by insider threats and shadow IT and how these internal risks differ from external threats

Explain how cyber attacks are planned and carried out.

Describe Tactics, Techniques, and Procedures (TTPs) and how they reveal attacker behavior

Understand the MITRE ATT&CK framework and how it organizes attack tactics and techniques

List the steps of the Cyber Kill Chain and how it helps defend against attacks

Describe the Diamond Model of Intrusion Analysis and how it helps analyze attacks

Define what attack patterns and signatures are and how they are used to identify adversaries

Explain the purpose of reconnaissance and how attackers gather information

Describe OSINT techniques, including DNS and website reconnaissance, social media scraping, eavesdropping, and dumpster diving

Define an attack surface and how it’s analyzed to find an attack vector and vulnerabilities that will be used during an attack

Explain the concept of weaponization in cyber attacks and the role of brokers in malware distribution

Identify common types of malware, including viruses, worms, trojans, ransomware, spyware, Command and Control (C2), Remote Access Trojans (RATs), botnets, and fileless malware

Discuss enterprise-level concerns related to malware and strategies for mitigation

Explain the role of social engineering in cyber attack delivery and how trust is developed with targets

Identify and describe common social engineering methods and tactics, including impersonation, phishing variants, and physical techniques like tailgating

Recognize advanced delivery techniques such as typosquatting, domain shadowing, and business email compromise (BEC)

Understand the impact of emerging tools, including AI, on social engineering attacks

Identify common vulnerabilities across networks, protocols, hardware, software, virtualization, cloud, cryptography, humans, passwords, processes, and physical security

Explain how different vulnerabilities can be exploited individually or combined through exploit chaining

Describe techniques for network discovery, reconnaissance, and enumeration, including both wired and wireless methods

Perform basic network scanning and fingerprinting using tools like Nmap and Wireshark

Explain wiretapping and sniffing attacks and how they are used to capture network data

Understand credential harvesting and vulnerability scanning as part of the attack lifecycle

Explain the concepts of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks and their impact on network availability

Identify various types of DoS attacks, including jamming, buffer overflow, ping of death, and TCP reset attacks.

Describe network flooding attacks such as ping flood, TCP SYN flood, UDP flood, DNS flood, amplification, and reflected attacks.

Demonstrate understanding of Wi-Fi deauthentication, DHCP starvation, and rogue DHCP attacks

Understand the mechanics behind broadcast storms, directed broadcasts, and smurf attacks

Explain what Adversary-in-the-Middle (AitM) and replay attacks are, including their impact on communications

Identify various spoofing attacks, including DHCP spoofing, ARP cache poisoning, DNS cache poisoning, and evil twin attacks

Understand how these attacks manipulate network traffic and deceive systems or users

Identify common software vulnerabilities using frameworks like Common Weakness Enumeration (CWE) and OWASP Top 10.

Explain different types of software attacks, including race conditions, deserialization, buffer overflow, path traversal, injection attacks, and cross-site scripting (XSS)

Identify common authentication and credential-based attacks such as password attacks, credential replay, and MFA fatigue.

Explain advanced access attacks including pass-the-hash, session hijacking, privilege escalation, and compromised key attacks

Describe exploitation techniques like jailbreaking, sideloading, trust exploits, and request forgery attacks (CSRF, SSRF)

Recognize physical attack vectors related to authentication and access control

Explain password hashing and the importance of salting to protect stored passwords

Demonstrate various password cracking methods, including brute-force, dictionary, mask attacks, and password spraying

Understand advanced cracking tools like hashcat and hydra used for account compromise

Recognize attacks such as rainbow tables, credential stuffing, and their impact on security

Explain common stealth techniques used by attackers, including encryption, tunneling, and obfuscation

Describe traffic manipulation methods such as traffic fragmentation and DNS tunneling

Identify network evasion tools like proxies, fast-flux, double-flux, and domain-flux

Understand how Domain Generation Algorithms (DGA) enable persistent and evasive communications

Identify common indicators of compromise (IoCs), including alerts, logs, and signs of removed evidence or disabled defenses

Recognize behavioral signs such as resource consumption issues, system crashes, and strange communications

Detect suspicious activities like data exfiltration, rogue devices, scans, beaconing, and unauthorized changes

Understand account anomalies including lockouts, new accounts, concurrent sessions, and impossible travel

Analyze other unusual system behaviors that may indicate a security breach

Who Should Take this Course:

Those getting into IT

Those wanting to advance their ethical hacking skills

Those going after a certification in

CompTIA Security+

CompTIA CySA+

CompTIA Pentest+

CompTIA SecurityX

ISC2 CISSP

Cisco CBROPS

Why take the course from me?

Experience: I’ve been in the IT world since 2000, have a masters in computers, and over 20 industry standard certifications

Know how to Teach: I was trained as an instructor by the USAF, have a bachelors in education, teaching since 1997, and well over 6,000 hours of classroom instruction time.

I’ve been a hiring manager since 2010, I know what skill sets employers are looking for.

TechKnowSurge’s Unique Approach

Your instructor has training and years of experience as an educator, as a technician, and as a leader. The course implements the following features:

Microstep lectures and segmented videosthat meters learning into bite size chunks. It also makes it easy to go back and review concepts when needed.

Staged-Based Educational Modelwhere information is covered multiple times in increasing amounts of complexity. The approach helps reinforce learning and creates a knowledge and skill set less likely to fade with time.

Extensive coverage of topicsto make sure topics are explained fully

Well-organized content. A tremendous amount of effort has been placed on what order content should be delivered to maximize learning and minimizing confusion.

A focus onpedagogy. A funny name, but your instructor has a deep understanding of educational theory and what drives learning.

Module overviewsexplaining what to expect for each module and sets a mindset for why the information is important to learn.

Video intros, overviews, and summariesto explain the intention of each video, reinforce learning, and prepare you for success.

High quality and engaging videosthat use graphics, great explanations, and analogies to explain complex topics in an easy to understand way.

Real world application. Step beyond just the theory. Your instructor has real world experience and will share that with you throughout the course.

Employer insight, know what employers are looking for. Your instructor runs IT Departments and hires individuals just like you.

This well organized course will has the following modules:

Welcome and Getting Started:Prepare yourself for efficiently and successfully completing the course. You’ll get an overview of what the course is all about and what you should expect out of it.

Knowing the Adversary:This module introduces key cybersecurity concepts related to threats and adversaries. We explore essential terminology, understand attacker motivations, and examine the characteristics, resources, and objectives of various adversaries. Topics include inside threats and shadow IT, helping learners grasp the landscape of cyber threats and the factors driving attacker behavior.

Attack Methodologies:This module covers how adversaries plan and execute cyber attacks using various tactics, techniques, and procedures (TTPs). Learners explore frameworks such as MITRE ATT&CK and models like the Cyber Kill Chain and Diamond Model of Intrusion Analysis. Through practical exercises, students learn to identify attack patterns and adversary signatures, enhancing their ability to anticipate and respond to threats.

Reconnaissance and Attack Planning:Focusing on the information-gathering phase of attacks, this module covers open-source intelligence (OSINT), DNS and website reconnaissance, social media scraping, and physical tactics such as dumpster diving and eavesdropping. Learners will understand attack surfaces and how vulnerabilities are discovered through various vectors.

Weaponization and Malware:This module examines how attackers create and deploy malware as weapons in cyber attacks. It covers a wide range of malware types, including viruses, worms, trojans, ransomware, spyware, and advanced threats like fileless malware and botnets. The role of brokers in malware distribution and enterprise-level concerns are also explored.

Delivery and Social Engineering:In this module, learners study how attackers deliver malicious payloads using social engineering techniques. Topics include phishing, impersonation, business email compromise, and physical attack vectors such as tailgating and USB drops. The impact of emerging technologies like AI on social engineering tactics is also examined.

Exploitation and Vulnerabilities:This module identifies common vulnerabilities across networks, protocols, hardware, software, virtualization, cloud environments, cryptography, humans, passwords, processes, and physical security. It explains how attackers exploit these vulnerabilities—often chaining exploits to maximize impact—and covers typical attacks used to compromise systems.

Persistence and Discovery:Learners will explore techniques for network discovery, enumeration, and reconnaissance on both wired and wireless networks. This module includes hands-on demonstrations with tools such as Nmap and Wireshark, and covers attacks like wiretapping, sniffing, credential harvesting, and vulnerability scanning.

Denial of Service (DoS) Attacks:This module explains the concepts and impact of DoS and DDoS attacks. Students learn about various attack types, including jamming, buffer overflow, ping of death, and flooding attacks like TCP SYN flood and amplification. Demonstrations highlight attacks such as Wi-Fi deauthentication and DHCP starvation.

AitM and Spoofing Attacks:Focusing on interception and deception techniques, this module covers AitM, replay attacks, and spoofing attacks such as DHCP spoofing, ARP cache poisoning, DNS cache poisoning, and evil twin attacks. Learners gain insight into how these attacks manipulate network traffic to breach security.

Common Application Attacks:This module reviews common software weaknesses using the Common Weakness Enumeration (CWE) and OWASP Top 10 frameworks. Learners explore attacks like race conditions, deserialization, buffer overflows, path traversal, injection attacks, SQL injection, and cross-site scripting (XSS) through demonstrations and practical examples.

Common Access Attacks:Students examine attacks targeting authentication systems, including password and credential attacks, MFA fatigue, pass-the-hash, session hijacking, privilege escalation, jailbreaking, sideloading, and various request forgery attacks. The module also discusses physical attack vectors compromising access controls.

Password Cracking:This module covers how passwords are protected and attacked. Learners will explore password hashing, salting, and cracking methods such as brute-force, dictionary, mask attacks, and password spraying. Tools like hashcat and hydra are demonstrated alongside attacks including rainbow tables and credential stuffing.

Stealth Techniques:Students will learn about stealth techniques attackers use to avoid detection, including encryption, tunneling, obfuscation, traffic fragmentation, and DNS tunneling. The module also covers evasion tools like proxies, fast-flux, double-flux, domain-flux, and domain generation algorithms (DGA) for persistent communications.

Indicators of Compromise (IoC):This module teaches how to recognize indicators of compromise (IoCs), such as alerts, logs, removed evidence, and disabled defenses. It also covers behavioral signs like resource consumption, system crashes, strange communications, rogue devices, unauthorized account activity, and other suspicious behaviors indicating a breach.

Wrap Up:Time to wrap up the course and provide any final thoughts.

Instructor Bio

TechKnowSurge (Andrew Grimes) has been in the tech industry since 2000 and even longer as an Instructor. He started out as a Survival Instructor for the United States Air Force (USAF) in 1997. When he got out of the military, he started teaching computer classes. Wanting to advance his technical skills, he became a contractor working on a wide range of technologies while teaching technology college courses in the evening. Overtime, he became a hiring manager, director, and leader

His background includes:

Building a security program within 2 years to include becoming SOC 2 Type 2 compliant

Leading and maximizing efficiency of IT, Security, and DevOps teams

Managing SaaS company infrastructure with millions of active users

Managing small, medium, and large IT Infrastructures

Migrating technologies to the cloud

Managing multi-million dollar budgets and reducing overall budget spend year over year

Utilizing various project management techniques such as waterfall, scrum and Kanban to maximize efficiency and success

Bachelors in Workforce Education

Masters in Computer Resource and Information Management

Over 6,000 hours of teaching experience

Over 20 industry standard certifications.

Past student reviews:

“Andrew is absolutely the best instructor I've had throughout the course of my education. He is extremely knowledgeable when it comes to all things network and IT-related. Because of the education he provided, I am now working in the network engineering field, and I could not have done it without his expert guidance.” ~Michael B.

“Andrew was hands down my favorite instructor since enrolling” “He has great skills as an instructor, and I've learned a lot from his classes.” ~Jeff S.

“As an instructor, he is thorough, articulate, patient and positive. He genuinely cares that his students fully comprehend the curriculum. I have a great deal of respect for Andrew. I can't recommend him highly enough.” ~Dan H.

“I found Andrew to be one of the best Instructors” “He presents the information with real world applications, which helped to reinforce the concepts presented in the Cisco Certification track.” “I am truely thankful to have had him as my teacher.” ~Dan M.

“Andrew is very knowledgeable and brings his practical business experience with him. He expresses himself very well and treats everyone with respect. He explains very complicated concepts in a manner that is easy to understand.” “It is without reservation that I would recommend Andrew as a business professional and/or teacher.” ~Adam C.

“Andrew is an excellent instructor and more.” “Andrew is the kind of teacher that you never forget.” ~ William C.

“Andrew Grimes is a first rate instructor who genuinely cares about the success of his students. I was fortunate to have Andrew as my instructor.” “I highly recommend Andrew as an instructor and IT professional.” ~Paul C.

“Andrew is a great instructor who really cares whether his students grasp the concepts he teaches. He has a passion for teaching that many couldn't muster.” ~Patrick R.

“He was a great teacher and I would gladly take a class under him again.” ~Joshua R.

“…his style of teaching is accommodating for any level, that a student is starting off at, either beginning or advance in IT world.” ~Paul W.

“He fosters a multidimensional environment of learning in which students of diverse abilities excel.” ~Mark B

“Andrew Grimes was a great Data Networks and Telecommunications Instructor.” “I would highly recommend him to any who desires to further their education.” ~ Tommy S.

Who this course is for:
- Those getting into IT
- Those wanting to advance their ethical hacking skills
- Those going after a certification in CompTIA Security+
- Those going after a certification in CompTIA CySA+
- Those going after a certification in CompTIA Pentest+
- Those going after a certification in CompTIA SecurityX
- Those going after a certification in ISC2 CISSP
- Those going after a certification in Cisco CBROPS
More Info