|
On Monday and Tuesday you can attend the special hands-on track for an extra $200. This option allows you to enjoy all the advantages of a major conference top-notch keynotes, full expo hall with the latest technologies and solutions, extensive networking opportunities while also being able to roll up your sleeves and test the skills you are learning right then and there.
Hands-On Track
Monday, April 15 & Tuesday, April 16
Ethical Hacking with Your Eyes Closed With the changing landscape of computing risks and the broadening protocol and application layers, today's information security professionals must be able to cope with blended threats and new "zero day" attacks using modern infrastructures. BYOD and cloud-based computing assets change the landscape of today's organizational security. Or do they? How do you assess the security of the unknown or unfamiliar?
Using free tools and a fundamental understanding of how security works, this hands-on course will focus on identifying security controls and weaknesses for any system, application or device. As you participate in hands-on pentesting exercises on a real network, you will learn how to perform a security audit with your eyes closed. Throughout the course, students will learn how to think outside the box while performing various hacking skills, ultimately leading to several "Capture the Flag" exercises.
Topics and tools covered in this course include:
Document grinding and target discovery using Nmap, Shodan, Foca
and Maltego
Service and protocol discovery using Nmap, Metasploit and other tools
Vulnerability discovery and analysis using Nmap, Cain and Abel, and more
Password cracking using John the Ripper, Cain and Abel, and others
Identifying and measuring the security of any system, application or device, regardless of your knowledge of the target
How to utilize open-source technologies and new attack scenarios to operate like a hacker
How to use additional open-source tools to defend against these attacks
Hands-on experience in multiple "Capture the Flag" challenges, using tools and techniques covered in the course
Pre-requisite Knowledge
Basic Windows and *Nix command-line skills
Understanding of how to operate VMware running on Windows (or Fusion running on Mac)
Basic understanding of the IP protocol
Programming skills are a plus, but not required (PHP, Python and Perl)
ABOUT THE INSTRUCTOR
Michael Menefee, CEO, Trusted Metrics Inc.
Michael Menefee is the CEO of Trusted Metrics, Inc., a Managed Security Services Provider (MSSP) based in Raleigh, North Carolina. He is also Founder of Infosec Island (an online information security portal) and Founder of WireHead Security, a security consulting firm. Mr. Menefee has 16 years of experience as an information security professional, much of that time spent performing penetration tests, social engineering exercises and comprehensive security auditing work for organizations across the globe. He founded and ran the North Carolina OWASP chapter and is a team member at ISECOM, dedicated to researching Trust.
Laptop Requirements: Students must bring their own laptop running Windows XP Pro (SP2+), Windows 7 or Apple IOS, with a VMware Player or VMware Workstation installed (Fusion for Mac). Laptop must have a working CD/DVD drive and wireless adapter. Students should also have the latest version of Firefox installed on their laptops.
|