SONDRA SCHNEIDER JOHN NUNES



Similar documents
CEH Version8 Course Outline

Certified Ethical Hacker Exam Version Comparison. Version Comparison

[CEH]: Ethical Hacking and Countermeasures

CYBERTRON NETWORK SOLUTIONS

EC Council Certified Ethical Hacker V8

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Certified Ethical Hacker (CEH)

KEVIN CARDWELL. Q/SA (Qualified Security Analyst) Penetration Tester. & Optional Q/PTL (Qualified Penetration Licence) Workshop

Ethical Hacking Course Layout

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Detailed Description about course module wise:

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

INFORMATION SECURITY TRAINING

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM


Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

Professional Penetration Testing Techniques and Vulnerability Assessment ...

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

ETHICAL HACKING. By REAL TIME FACULTY

CRYPTUS DIPLOMA IN IT SECURITY

Build Your Own Security Lab

Ethical Hacking v7 40 H.

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

McAfee Certified Assessment Specialist Network

Course Outline: Certified Ethical Hacker v8. Learning Method: Instructor-led Classroom Learning

FSP-201: Ethical Hacking & IT Security

Network Attacks and Defenses

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

EC-Council. Certified Ethical Hacker. Program Brochure

Certified Cyber Security Expert V Web Application Development

Networking: EC Council Network Security Administrator NSA

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

EC-Council. Program Brochure. EC-Council. Page 1

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Securing Cisco Network Devices (SND)

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

RMAR Technologies Pvt. Ltd.

Learn Ethical Hacking, Become a Pentester

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Vulnerability Assessment and Penetration Testing

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Kerem Kocaer 2010/04/14

Description: Objective: Attending students will learn:

CIS 4204 Ethical Hacking Fall, 2014

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

LINUX / INFORMATION SECURITY

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

MAX DOLGICER THE INTERNET OF THINGS NAVIGATING THE FUTURE OF INFORMATION TECHNOLOGY

Penetration Testing with Kali Linux

EC-Council Certified Security Analyst (ECSA)

Course Content: Session 1. Ethics & Hacking

A Systems Engineering Approach to Developing Cyber Security Professionals

Course Title: Course Description: Course Key Objective: Fee & Duration:

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

CompTIA Security+ (Exam SY0-410)

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Network Security: A Practical Approach. Jan L. Harrington

Certified Penetration Testing Specialist

Malicious Network Traffic Analysis

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Assessing Network Security

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Hackers are here. Where are you?

Audience. Pre-Requisites

Quick Start Guide to Ethical Hacking

Information Security. Training

Attack Frameworks and Tools

Ethical Hacking I Course of Study for HAC2

Security: Attack and Defense

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Application Security Testing

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

EC-Council Ethical Hacking and Countermeasures

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Certified Cyber Security Analyst VS-1160

Jort Kollerie SonicWALL

Chapter 15: Computer and Network Security

ASK PC Certified Information Systems Security Expert - CISSE

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Transcription:

TECHNOLOGY TRANSFER PRESENTS SONDRA SCHNEIDER JOHN NUNES CERTIFIED ETHICAL HACKER TM THE ONLY WAY TO STOP A HACKER IS TO THINK LIKE ONE MAY 21-25, 2007 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it

CERTIFIED ETHICAL HACKER TM ABOUT THIS SEMINAR Scan, test, hack and secure your systems. Security Hacking for Professionals. Certified Ethical Hacking 5- Day Class certifies students in the specific network security discipline of Ethical Hacking. The lab intensive environment gives each student in-depth knowledge and practical experience of perimeter defenses, scanning and attacking lab net escalating privileges on a system and how to secure a system. No real network is harmed. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. Class Tuition and Bonuses Instruction and review with an experienced master of Ethical Hacking CEH Certification Exam on site last day of class Access to Security University s IT Professional Reference Library of targeted pre-class reading, with: - Free CD of Linux & Free 2-CD set containing over 300 up-to-date Hacking tools and exploits - Labs times are 8-9 am, 5-7 pm. - Class book, lab handouts Certified Ethical Hacker, CEH Certification, tests on the following 22 domains: 1. Ethics and Legal Issues 2. Footprinting 3. Scanning 4. Enumeration 5. System Hacking 6. Trojans and Backdoors 7. Sniffers 8. Denial of Service 9. Social Engineering 10. Session Hijacking 11. Hacking Web Servers 12. Web Application Vulnerabilities 13. Web Based Password Cracking Techniques 14. SQL Injection 15. Hacking Wireless Net 16. Virus and Worms 17. Physical Security 18. Linux Hacking 19. IDS, Firewalls and Honeypots 20. Buffer Overflows 21. Cryptography 22. Penetration Testing Methodologies The partecipants are kindly requested to bring their laptop with wireless connection capability. CEH Certification Exam on site last day of class.

CERTIFIED ETHICAL HACKER TM OUTLINE 1. Ethics and Legality Understand Ethical Hacking terminology Define the Job role of an Ethical Hacker Understand the different phases involved in Ethical Hacking Identify different types of Hacking technologies List the 5 stages of Ethical Hacking? What is hacktivism? List different types of Hacker classes Define the skills required to become an Ethical Hacker What is vulnerability research? Describe the ways in conducting Ethical Hacking Understand the Legal implications of Hacking 2. Footprinting Define the term Footprinting Describe information gathering methodology Describe competitive intelligence Understand DNS enumeration Understand Whois, ARIN lookup Identify different types of DNS records Understand how traceroute is used in Footprinting Understand how e-mail tracking Understand how Web spiders work 3. Scanning Define the term port scanning, network scanning and vulnerability scanning Understand the CEH scanning methodology Understand Ping Sweep Understand nmap command switches Understand SYN, Stealth, XMAS, NULL, IDLE and FIN scans List TCP communication flag types Understand War dialing Understand banner grabbing and OF fingerprinting Understand how proxy servers are used in launching an attack How does anonymizers work Understand HTTP tunneling Understand IP spoofing 4. Enumeration What is Enumeration? What is meant by null sessions What is SNMP Enumeration? What are the steps involved in performing Enumeration? 5. System Hacking Understanding password cracking Understanding different types of passwords Identifying various password cracking tools Understand Escalating privileges Understanding keyloggers and other spyware technologies Understand how to Hide files Understanding rootkits Understand Steganography technologies Understand how to covering your tracks and erase evidences 6. Trojans and Backdoors What is a Trojan? What is meant by overt and covert channels? List the different types of Trojans What are the indications of a Trojan attack? Understand how Netcat Trojan What is meant by wrapping How does reverse connecting Trojans work? What are the countermeasure in preventing Trojans? Understand Trojan evading 7. Sniffers Understand the protocol susceptible to sniffing Understand active and passive sniffing Understand ARP poisoning Understand ethereal capture and display filters Understand MAC flooding Understand DNS spoofing Describe sniffing countermeasures 8. Denial of Service Understand the types of DoS Attacks Understand how DDoS attack Understand how BOTs/BOT- NETS work What is smurf attack What is SYN flooding Describe the DoS/DDoS countermeasures 9. Social Engineering What is Social Engineering? What are the Common Types of Attacks Understand Dumpster Diving Understand Reverse Social Engineering Understand Insider attacks Understand Identity Theft Describe Phishing Attacks Understand Online Scams Understand URL obfuscation Social Engineering countermeasures

10. Session Hijacking Understand Spoofing vs Hijacking List the types of Session Hijacking Understand Sequence Prediction What are the steps in performing Session Hijacking Describe how you would prevent Session Hijacking 11. Hacking Web Servers List the types of Web Server vulnerabilities Understand the attacks Against Web Servers Understand IIS Unicode exploits Understand patch Management Understand Web Application Scanner What is Metasploit Framework? Describe Web Server hardening methods 12. Web Application Vulnerabilities Understanding how Web Application Objectives of Web Application Hacking Anatomy of an attack Web Application threats Understand Google Hacking Understand Web Application Countermeasures 13. Web Based Password Cracking Techniques List the Authentication types What is a Password Cracker? How does a Password Cracker work? Understand Password Attacks - Classification Understand Password Cracking Countermeasures 14. SQL Injection What is SQL injection? Understand the Steps to conduct SQL injection Understand SQL Server vulnerabilities Describe SQL injection countermeasures 15. Wireless Hacking Overview of WEP, WPA authentication systems and cracking Overview of wireless Sniffers and SSID, MAC Spoofing Understand Rogue Access Points Understand Wireless Hacking Describe the methods in securing Wireless Net 16. Virus and Worms Understand the difference between an Virus and a Worm Understand the types of Viruses How a Virus spreads and infects the system Understand antivirus evasion Understand Virus detection methods 17. Physical Security Physical security breach incidents Understanding physical security What is the need for physical security? Who is accountable for physical security? Factors affecting physical security 18. Linux Hacking Understand how to compile a Linux Kernel Understand GCC compilation commands Understand how to install LKM modules Understand Linux hardening methods 19. Evading IDS, Honeypots and Firewalls List the types of Intrusion Detection Systems and evasion List firewall and honeypot evasion 20. Buffer Overflows Overview of stack based buffer overflows Identify the different types of buffer overflows and methods of detection Overview of buffer overflow mutation 21. Cryptography Overview of cryptography and encryption Describe how public and private keys are generated Overview of MD5, SHA, RC4, RC5, Blowfish algorithms 22. Penetration Testing Methodologies Overview of Penetration Testing methodologies List the Penetration Testing steps Overview of the Pen-Test legal framework Overview of the Pen-Test deliverables List the automated Penetration Testing tools

INFORMATION PARTICIPATION FEE 2600 The fee includes all seminar documentation, luncheon and coffee breaks. VENUE Visconti Palace Hotel Via Federico Cesi, 37 Rome (Italy) SEMINAR TIMETABLE 9.30 am - 1.00 pm 2.00 pm - 5.00 pm HOW TO REGISTER You must send the registration form with the receipt of the payment to: TECHNOLOGY TRANSFER S.r.l. Piazza Cavour, 3-00193 Rome (Italy) Fax +39-06-6871102 within May 7, 2007 PAYMENT Wire transfer to: Technology Transfer S.r.l. Banca Intesa Sanpaolo S.p.A. Agenzia 3 di Roma Iban Code: IT-34-Y-03069-05039-048890270110 GENERAL CONDITIONS If anyone registered to participate is unable to attend, a substitute may participate in their place. A full refund is given for any cancellation received more than 15 days before the seminar starts. Cancellations less than 15 days prior the event are liable for 50% of the fee. Cancellations less than one week prior to the event are liable for the full fees as invoiced. In case of cancellation of the seminar, Technology Transfer s responsibility only applies to the refund of the participation fees which have already been forwarded. SONDRA SCHNEIDER JOHN NUNES CERTIFIED ETHICAL HACKER TM first name... surname... May 21-25, 2007 Visconti Palace Hotel Via Federico Cesi, 37 Rome (Italy) Registration fee: 2600 job title... organisation... address... postcode... Stamp and signature city... country... If registered participants are unable to attend, or in case of cancellation of the seminar, the general conditions mentioned before are applicable. telephone... fax... e-mail... Send your registration form with the receipt of the payment to: Technology Transfer S.r.l. Piazza Cavour, 3-00193 Rome (Italy) Tel. +39-06-6832227 - Fax +39-06-6871102 info@technologytransfer.it www.technologytransfer.it

SPEAKERS Sondra Schneider is an 20-year industry veteran. She is Senior Director of Security University, an Advanced Information Security Training University. For the past five years Ms. Schneider has been traveling internationally training network Professionals in Advanced Network Security Technologies. She has been a frequent speaker at security industry events and closely with the vendor community to provide training and feedback. Ms. Schneider is a pioneer in security technology, specializing in network perimeter security, vulnerability auditing, intrusion detection, advanced authentication and PKI systems, and broad band net. Prior to founding Security University, she was a partner in a New York-based Information security firm. She was previously Northeast Director of Business development for the WheelGroup Corporation, where she was responsible for the introduction and implementation of the CISCO/WheelGroup NetRanger and NetSonar product line with large customers and VARs. Capitalizing on her earlier product experience, she brought Real-Time Intrusion Detection systems and tools to telcos, healthcare, financial institutions and Fortune 500 customers. Before joining WheelGroup, Ms. Schneider was a Senior Data Network Engineer and Internet Specialist for AT&T. John Nunes is the Director of Qualified Information Security Professional for Security University and is based out of the Washington DC area. With an extensive Computer Security background, Mr. Nunes has 13 years of Penetration Testing experience most recently as an independent consultant and previously Internet Security Systems (ISS). He has written both Penetration Testing and Wireless Security and Wireless Hacking courses along with numerous white papers and Case Studies and performed Wireless Security assessments and Penetration Tests. John Nunes is a former Naval Cryptologist and Computer Security Specialist with 12 years of military service. He has assisted and trained various U.S. Government agencies as well as local and Federal law enforcement. Prior to joining Security University, Mr. Nunes taught a number of Hacking and Intrusion Detection courses worldwide and provides security assessments to small and midsize companies.