InfoSec Academy Pen Testing & Hacking Track

Similar documents
InfoSec Academy Application & Secure Code Track

InfoSec Academy Forensics Track

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

EC-Council. Certified Ethical Hacker. Program Brochure

EC Council Certified Ethical Hacker V8

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

C)PTC Certified Penetration Testing Consultant

Certified Penetration Testing Consultant

[CEH]: Ethical Hacking and Countermeasures

CYBERTRON NETWORK SOLUTIONS

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Hackers are here. Where are you?

Detailed Description about course module wise:

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

Penetration Testing Services. Demonstrate Real-World Risk

Analyze. Secure. Defend. Do you hold ECSA credential?

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Hackers are here. Where are you?

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

CEH Version8 Course Outline

Certified Ethical Hacker (CEH)

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Certification Programs

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

Network/Internet Forensic and Intrusion Log Analysis

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

EC-Council Certified Security Analyst (ECSA)

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Audience. Pre-Requisites

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Access FedVTE online at: fedvte.usalearning.gov

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

CERTIFIED PENETRATION TESTING CONSULTANT

LINUX / INFORMATION SECURITY

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Certification Programs

EC-Council. Program Brochure. EC-Council. Page 1

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Penetration testing & Ethical Hacking. Security Week 2014

Presented by Frederick J. Santarsiere

Certified Penetration. Testing Consultant (CPTC)

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

2016 TÜBİTAK BİLGEM Cyber Security Institute

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

INFORMATION SECURITY TRAINING CATALOG (2016)

INFORMATION SECURITY TRAINING CATALOG (2015)

Information Systems Security Certificate Program

EC-Council Ethical Hacking and Countermeasures

Certified Cyber Security Analyst VS-1160

THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI

Penetration Testing. Request for Proposal

Technical Testing. Network Testing DATA SHEET

NETWORK INFRASTRUCTURE SECURITY

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Ethical Hacking Penetrating Web 2.0 Security

Introduction to Cyber Security / Information Security

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

FedVTE Course Library

CRYPTUS DIPLOMA IN IT SECURITY

Information Security Services

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

IINS Implementing Cisco Network Security 3.0 (IINS)

Networking: EC Council Network Security Administrator NSA

Learn Ethical Hacking, Become a Pentester

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

Welcome to the Protecting Your Identity. Training Module

SECURITY CONSIDERATIONS FOR LAW FIRMS

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

FedVTE Course Library

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Implementing Cisco IOS Network Security

Passing PCI Compliance How to Address the Application Security Mandates

Digital Pathways. Penetration Testing

The Top Web Application Attacks: Are you vulnerable?

Presented by Evan Sylvester, CISSP

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Inquire about our programs at Worcester Technical High School!

ETHICAL HACKING CYBER SECURITY

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

Understanding Security Testing

Jort Kollerie SonicWALL

Simple Steps to Securing Your SSL VPN

Penetration Testing: Lessons from the Field

Cisco Advanced Services for Network Security

Course Title: Penetration Testing: Security Analysis

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

2015 TRUSTWAVE GLOBAL SECURITY REPORT

Transcription:

Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security & Policy Assurance Soft Skills Certified Security Sentinel C)SS & Certified Vulnerability Assessor C)VA Certified Information Systems Security Officer Certified Penetration Testing Engineer C)PTE Certified Penetration Testing Consultant C)PTC Certified Information Security Manager (CISM) Certified Information Systems Auditor (CISA) Certified Ethical Hacker (CEH)

Texas Security Policy & Assurance Course Upon successful completion of this course, the participant will be prepared to ISOs & CISOs Module 1: Texas Rules and Legislation apply the state rules regarding information security in the state of Texas within their agency. Modules 2: Data Classification Module 3: Security Framework Module 4: Agency Security Plans Modules 5: Reports Modules 6: Security Services Soft Skills Course (examples): Team Building Without Time Wasting Helping Employees Use Their Time Wisely Everybody Wins: How to Turn Conflict into Collaboration A variety of soft skills courses are available covering a wide range of topics. Dependent on the course N/A

Certified Security Sentinel - C)SS The Certified Security Sentinel certification course is intended for anyone that Employees who need to learn the uses a computer on the internet. Attendees will not only understand security basics of security. threats and attacks but also be prepared with countermeasures for these attacks. The weakest link in any companies' security program is a poorly trained employee. Once a student understands what can happen, they will know what to look for. And with that understanding, be able to keep the information they have been entrusted with as safe as possible. The social engineering portion of the class is designed to teach the participants the skills used by social engineers to facilitate the extraction of information from an organization using technical and non-technical methods. Computer fraud, black-hat hacking, and cyber-terrorism are all phrases that describe crimes that use over-the-wire technology to attack, steal, and terrorize their victims. The key to most of these over-the-wire attacks being successful is information they receive through social engineering. Does it work? Can smart people be easily deceived? Kevin Mitnick, who served five years in prison for repeated hacking said in testimony before Congress on the subject of Social Engineering: I was so successful with that attack that I rarely had to resort to a technical attack. If you're afraid of having your identity, credit card credentials, or business information compromised, then this is the training you have been looking for. The Certified Security Sentinel certification course trains students on how attacks are performed, how to identify an attack, and how to secure information. One of the most valuable skill sets of a C)SS is that they understand how to train others on security as well. Module 1: Basic Computer Security Module 2: User Awareness Module 3: Implementation Countermeasures Module 4: Essential Security Awareness Module 5: Using the Internet at Work Module 6: Accessing the Network Locally Module 7: Accessing the Network Remotely Module 8: Social Engineering Module 9: Understanding and Interacting with our Target Module 10: Researching Our Target Module 11: Methods of Deception

Certified Vulnerability Assessor C VA The Certified Vulnerability Assessor course trains students to be proficient in Module 1: Why Vulnerability Assessment conducting vulnerability assessments by: Module 2: Vulnerability Types 1. Teaching the risk associated with information technology and why a Module 3: Assessing the Network vulnerability assessment is crucial to the continuing operations of a business. Module 4: Assessing Web Servers & Applications 2. Preparing students with the tools and knowledge of how to perform a Module 5: Assessing Remote & VPN Services vulnerability assessment. Module 6: Vulnerability Assessment Tools 3. Instructing students on how to summarize and report on their findings Module 7: Output Analysis from a vulnerability assessment. This is accomplished by having students perform in-depth labs that focus IT Professionals recognizing prominent threats with industry proven tools, learn our proven methodology by using real world examples, and study what vulnerabilities hackers look for when trying to hack into systems. After completing the course, students will be able to sit for the Certified Vulnerability Assessor exam. Upon passing the exam, students will be able to use the C)VA certification.

Certified Vulnerability Assessor C)VA The Certified Vulnerability Assessor course trains students to be proficient in IT Professionals Module 1: Why Vulnerability Assessment conducting vulnerability assessments by: Module 2: Vulnerability Types 1. Teaching the risk associated with information technology and why a Module 3: Assessing the Network Module 4: Assessing Web Servers & Applications vulnerability assessment is crucial to the continuing operations of a business. Module 5: Assessing Remote & VPN Services 2. Preparing students with the tools and knowledge of how to perform a Module 6: Vulnerability Assessment Tools vulnerability assessment. Module 7: Output Analysis 3. Instructing students on how to summarize and report on their findings from a vulnerability assessment. This is accomplished by having students perform in-depth labs that focus recognizing prominent threats with industry proven tools, learn our proven methodology by using real world examples, and study what vulnerabilities hackers look for when trying to hack into systems. After completing the course, students will be able to sit for the Certified Vulnerability Assessor exam. Upon passing the exam, students will be able to use the C)VA certification.

Certified Penetration Testing Engineer C)PTE The Certified Penetration Testing Engineer course trains students on the 5 key Ethical Hacker elements of penetration testing: information gathering, scanning, Security Consultant enumeration, exploitation and reporting. Ethical hacking is the art of using System Administrator these penetration testing techniques to identify and repair the latest Chief Security Officer vulnerabilities in a system to make sure it is secure. Malicious hackers use these same techniques to find the same vulnerabilities except they exploit the vulnerabilities giving them access to the businesses network. Once inside, hackers can access private information, such as usernames, passwords, credit card numbers, and social security numbers of clients and employees. It s very likely this data will be held for ransom or sold off on a black market. Hackers are constantly looking for new companies they can exploit; when they come across yours, will they be able to gain access? Certified Penetration Testing Engineers are the solution to prevent this from happening to businesses they serve. With our proprietary penetration testing lab exercises, students will spend about 20 hours getting real-world penetration testing experience. They'll know what they are learning and they'll know how to use it after course. Our instructors will also provide real life examples of when to use the techniques that are being taught. There is no better way to learn the art of penetration testing. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Module 0: Course Overview Module 1: Logistics of Pen Testing Module 2: Linux Fundamentals Module 3: Information Gathering Module 4: Detecting Live Systems Module 5: Enumeration Module 6: Vulnerability Assessments Module 7: Malware Goes Undercover Module 8: Windows Hacking Module 9: Hacking UNIX/Linux Module 10: Advanced Exploitation Techniques Module 11: Pen Testing Wireless Networks Module 12: Networks, Sniffing and IDS Module 13: Injecting the Database Module 14: Attacking Web Technologies Module 15: Project Documentation Lab 1: Getting Set Up Lab 2: Linux Fundamentals Lab 3:Information Gathering Lab 4: Detecting Live Systems Lab 5: Reconnaissance Lab 6: Vulnerability Assessment Lab 7: Malware Lab 8: Windows Hacking Lab 9: UNIX/Linux Hacking Lab 10: Advanced Vulnerability and Exploitation Lab 11: Attacking Wireless Networks Lab 12: Network Sniffing and IDS Lab 13: Database Hacking Lab 14: Hacking Web Applications

Certified Penetration Testing Consultant C)PTC The Certified Penetration Testing Consultant course is our advanced course in our penetration testing track. The C)PTC is designed for cyber security professionals and IT network administrators who are interested in conducting Penetration tests against large network infrastructures, such as large corporate networks. The training starts with capturing and analyzing basic packets and continues with Layer2 attack vectors; Layer3 based attacks, including both IPv4 and IPv6 stacks, routing protocol attacks (OSPF, BGP, etc); Service Provider level attacks related with very common used MPLS; how to use relays and pivots; VPN attacks including IPSEC protocol suite; SSL attacks; and finally covers NIDS/NIPS evasion and implementation techniques. At the completion of each module, students are going to be able to practice their knowledge with the lab exercises that are specifically prepared for the covered materials during the theory. Security Consultant Ethical Hacker IT Management Chief Security Officer Module 1: Packet Capturing Module 2: Layer 2 Attacks Module 3: Layer 3 Attacks on Cisco Based Infrastructures Module 4: Pivoting and Relays Module 5: IPv6 Attacks Module 6: VPN Attacks Module 7: Defeating SSL Module 8: IDS/IPS Evasion Lab 1: Working with Captured Files Lab 2: Layer 2 Attacks Lab 3: Attacking Routing Protocols Lab 4: Using Pivot Machines Lab 5: IPv6 Attacks Lab 6: VPN attack Lab 7: Defeating SSL, Decrypting Traffic and man-in-the-middle attacks Lab 8: NIDS/NIPS