TECHNOLOGY TRANSFER PRESENTS KEVIN CARDWELL Q/SA (Qualified Security Analyst) Penetration Tester & Optional Q/PTL (Qualified Penetration Licence) Workshop MAY 18-22, 2009 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it
Q/SA Penetration Tester & opzional Q/PTL ABOUT THIS SEMINAR The Q/SA Qualified/ Security Analyst Penetration Tester class is security analysis, Penetration Testing, Vulnerability Testing, with tactical security skills certification labs. Over 40 Penetration Testing, shredding Web apps, & privilege escalation labs. No where will you get a more intense hands-on class in Penetration Testing and security analysis! You earn a Security University Q/SA Certification and (Optional) Q/PTL Penetration Tester License that validates your skills. The Q/SA class has been considered the best Penetration Testing skills certification that validates you to be a Qualified Security Analyst Penetration Tester. Daily you learn how to test & how to report network vulnerabilities and exploit bad code. Daily live labs where you practice shredding applications & exploiting vulnerabilities. The only way to get a Q/PTL Qualified Penetration License is to EARN one, not buy one. The Optional Q/PTL is 3 hours after Q/SA class ends each day (Tuesday Thursday from 5.30 p.m until 8.30 p.m). You ll practice how to gain access to unauthorized information with current exploitation tools and processes. Not just learn the tactical business skills necessary to perform valid vuln security testing regardless of the target. The Q/PTL workshop validates your Penetration Testing and security analysis tactical skills you learned in the Q/SA class. To achieve your Q/PTL Qualified/ Penetration Tester License you must perform a Penetration Test with a fully detailed management report to earn your Q/PTL License from Security University (due 7 days after class). Compliance requirements aside, penetration testing is an absolutely critical aspect of any security program. Attackers test every company s defenses every day. An organization either knows what the bad guys are going to find, or it doesn t. If you don t, it s not a matter of if, it s a matter of when. Great pen-testers think like hackers. They use the same tools and techniques, only they tend to be much more comprehensive in their testing of attack scenarios. WHO SHOULD ATTEND System and Network Administrators Security Personnel Auditors Consultants concerned with network security Threat Management Team Software Programmers Forensic Experts Class Completion Q/SA Qualified/ Security Analyst Penetration Tester class will provide you with valuable skills and information, including: Latest exploit goals and methodologies Understanding the mind set needed to perform Penetration Testing Advanced information-gathering techniques Expert network discovery tools and techniques Identifying & exploiting network weaknesses with Core Impact and more tools Advanced enumeration of network devices, platforms and protocols Cracking contemporary authentication and authorization Advanced router, firewall and IDS testing\exploiting IPS Vulnerability research and automated scanning in the Enterprise Scanning for root kits, trojans, malware and viruses Tools for Web application testing - Watchfire and freeware tools Exploiting complex protocols, such as SSH, SSL, and IPSEC Using payload generators Advanced wireless testing tools and techniques Penetration Testing of Wetware Penetration Testing and the law You ll learn how to gather viable data on your network s vulnerabilities using leading edge tools like Nessus, NeWT and NeVO vulnerability detection tools, MetaSploit, SaintScanner and Exploit, SOLARWINDS, NMAP, App Detective for Web attacks and the latest in exploit tools, CORE IMPACT from Core Security.
Penetration concepts you will master during this hands on class Attacking network infrastructure devices Hacking by brute forcing remotely Security testing methodologies Security exploit testing with IMPACT from Core Security Stealthy network recon Remote root vulnerability exploitation Multi-OS banner grabbing Privilege escalation hacking Unauthorized data extraction Breaking IP-based ACLs via spoofing Evidence removal and anti-forensics Hacking Web Applications Breaking into databases with SQL Injection Cross Site Scripting hacking Remote access trojan hacking Offensive sniffing Justifying a Penetration Test to management and customers Defensive techniques Instructor-led hands-on lab exercises Capture the Flag hacking exercises Abusing DNS for host identification Leaking system information from Unix and Windows Stealthy Recon Unix, Windows and Cisco password cracking Remote buffer overflow exploit lab I - Stack mashing Remote heap overflow exploit lab - Beyond the Stack Desktop exploitation Remote keylogging Data mining authentication information from clear-text protocols Remote sniffing Malicious event log editing Transferring files through firewalls Hacking into Cisco routers Harvesting Web application data Data retrieval with SQL Injection Hacking
OUTLINE Phase I Gather the Data A first look at a network site, from the eyes of a potential hacker. The simple, and often overlooked, things that tell hackers if a site is worth a penetration attempt. Phase II Penetrate the Network How hackers get past the security and into the data Non-intrusive target search Intrusive target search Data analysis Network Discovery Tools and Techniques: Hands-On Exercises Discovery/profiling objectives Locating Internet connections Host-locating techniques: manual and automated Operating system footprinting Evaluating Windows and Unixbased network discovery software tools Evaluating Windows and Unixbased application scanning software tools Review Step-by-step process of each scanning and profiling tool Directory services: DNS, DHCP, BOOTP, NIS Look-up services: finger, whois, search engines Remote sessions: telnet, r commands, X-Windows File sharing and messaging: FTP, TFTP, World Wide Web Windows Server Message Block (SMB), Network File Systems (NFS), and e-mail Sample exploits using common TCP/IP and NetBIOS utility software The Q/SA & Q/PTL materials address common pitfalls in Penetration Testing and ethical hacking projects, with real-world targets and to maximize the quality of test results. Daily capture the flag exercises increase your tactical skills. Learn timesaving tactics based on years of tactical security experiences from real penetration testers and ethical hackers defeating a problem in minutes We stress the mind-set of successful Penetration Testers and ethical hackers and balance skills with outside-the-box thinking, a Penetration methodology that stands the test of time and carefully weighing risks, and creating a quality final report for management You analyze how Penetration Testing and ethical hacking fits into a comprehensive information security & assurance program Phase III Analyze the Results Tips and techniques for effective, actionable penetration test analysis Identifying network services Pinpointing vulnerabilities Demonstrating risks and escalating permissions Reviewing reports and screens from prominent discovery/profiling tools Analyzing current configuration Real-World Scenarios Abusive e-mail Embezzlement Pornography Denial-of-service Web defacement Trojan Horse Phase IV Write the Report How to combine methodology, results, and analysis into a report that generates management attention and buy-in and provides clear, workable action items. In-Class Exercises for your Q/PTL Validation Qualification Building and maintaining a target list Conducting multiple non-intrusive and intrusive target searches Tools and techniques for testing for Web site vulnerabilities Probing and attacking network firewalls Performing multiple remote target assessment Performing multiple host assessment Writing up the final report The Q/PTL is the Most Prestigious Qualification for Security Analyst Penetration Testing Professionals We wrote the book on Penetration Testing. 9 years ago Security University started training security Professionals with the very best penetration step by step methodology class, 9 years later we still are and have the leading Pen Testing Certification in the industry. Over 40 + labs and Security University Q/SA class is only CNSS-approved Security Analyst Penetration Tester class. Now you can take the same Penetration Testing Methodology class that the US Air Force, Army, Navy and Marines trained to defend military networks. Your class is taught by SSME (Security Subject Matter Experts) who know the Art of Penetration Testing & Hacking. You ll gain serious tactical security skills that will set you apart from your peers.
INFORMATION PARTICIPATION FEE Q/SA Penetration Tester 2500 Q/PTL 1200 Both Classes 3500 The fee includes all seminar documentation, luncheon and coffee breaks. VENUE Visconti Palace Hotel Via Federico Cesi, 37 Rome (Italy) SEMINAR TIMETABLE 9.30 am - 1.00 pm 2.00 pm - 5.00 pm HOW TO REGISTER You must send the registration form with the receipt of the payment to: TECHNOLOGY TRANSFER S.r.l. Piazza Cavour, 3-00193 Rome (Italy) Fax +39-06-6871102 within May 4, 2009 PAYMENT Wire transfer to: Technology Transfer S.r.l. Banca Intesa Sanpaolo S.p.A. Agenzia 6787 di Roma Iban Code: IT 34 Y 03069 05039 048890270110 GENERAL CONDITIONS GROUP DISCOUNT If a company registers 5 participants to the same seminar, it will pay only for 4. Those who benefit of this discount are not entitled to other discounts for the same seminar. EARLY REGISTRATION The participants who will register 30 days before the seminar are entitled to a 5% discount. CANCELLATION POLICY A full refund is given for any cancellation received more than 15 days before the seminar starts. Cancellations less than 15 days prior the event are liable for 50% of the fee. Cancellations less than one week prior to the event date will be liable for the full fee. CANCELLATION LIABILITY In the case of cancellation of an event for any reason, Technology Transfer s liability is limited to the return of the registration fee only. KEVIN CARDWELL Q/SA Rome May 18-22, 2009 Visconti Palace Hotel - Via Federico Cesi, 37 Registration fee: 2500 Q/PTL Rome May 19-21, 2009 Visconti Palace Hotel - Via Federico Cesi, 37 Registration fee: 1200 first name... surname... job title... organisation... address... Stamp and signature BOTH CLASSES 3500 postcode... city... country... If registered participants are unable to attend, or in case of cancellation of the seminar, the general conditions mentioned before are applicable. telephone... fax... e-mail... Send your registration form with the receipt of the payment to: Technology Transfer S.r.l. Piazza Cavour, 3-00193 Rome (Italy) Tel. +39-06-6832227 - Fax +39-06-6871102 info@technologytransfer.it www.technologytransfer.it
SPEAKER Kevin Cardwell, spent 22 years in the U.S. Navy. He has worked as both software and systems engineer on a variety of Department of Defense projects and was selected to head the team that built a Network Operations Center (NOC) that provided services to the command ashore and ships at sea in the Norwegian Sea and Atlantic Ocean. Mr. Cardwell served as the Leading Chief of Information Security at the NOC for six years prior to retiring from the U.S. Navy. He currently works as a free-lance consultant and provides consulting services for companies throughout the US, UK and Europe.