View
232
Download
0
Category
Preview:
Citation preview
www.infoshield.com.om
Gain in-depth knowledge and practical experience of perimeter defenses, scanning and attacking networks, escalating privileges, hacking and secu-rity your own system.
Examine useful methods for uncovering network associated with both wired and wireless network connections.
Introduction to Hacking TechniqueDiscovery MethodsSystem Hacking and Enumeration Exploits and Advance Topics Covering Tracks and Anti ForensicDefending Systems
Date: 24 to 28 December 2011
Location: Infoshield Training Center
Instructor: Kevin Cardwell
Length: 5 days
Fees: 970
This practical course will help you to:
Course Description
Course Outline
Course Details
CEH
Resereve yourplace by 15
Sep 2011 and receive
BlackBerry
Kevin Cardwell spent 22 years in the U.S. Navy, during this time he tested and evaluated Surveillance and Weapon system software, some of this work wason projects like the Multi-Sensor Torpedo Alertment Pressor (MSTRAP), Tactical Decision Support System (TDSS), Computer Aided Dead Reckoning Tracer (CADRT), and the Remote Mine Hunting System (RMHS).He is technical editor of the Learning Tree Course Ethical Hacking and Counter measures and Computer Forensics.
Has worked as both software and systems engineer on a variety of Department of Defense projects and early on was chosen as a member of the project to bring Internet access to ships at sea. Following this highly successful project he was selected to head the team that built a Network Operations Center (NOC) that provided services to the commands ashore and ships at sea in the Norwegian Sea and Atlantic Ocean. He served as the Leading Chief of Information Se-curity at the NOC for (six) 6 years prior to retiring from the U.S. Navy. Mr. Cardwell currently works as a free-lance con-sultant and provides consulting services for com-panies throughout the US , UK and Europe, and as an advisor to numerous government entities within the US and UK.Kevin is an Instructor, Technical Editor and Author for Computer Forensics, and Hacking courses.
He is author of the Controlling Network Access course. He has presented at the Blackhat USA Conferences. He is a contributing author to the Computer Hack-ing Forensics Investigator V3 Study Guide and The Best Damn Cybercrime and Digital Forensics Book Period. - He is a Certified Ethical Hacker (CEH). - Certified Security Analyst (E|CSA).- Qualified Penetration Tester (QPT).- Certified in Handheld Forensics, and Advanced Mobile Phone Forensics. - Computer Hacking Forensic Investigator (CHFI). - Live Computer Forensics Expert (LCFE). - Holds a BS in Computer Science from National University in California and a MS in Software Engineering from the Southern Methodist University (SMU) in Texas.
InfoShield was founded in 2005 specialising exclusively on providing comprehensive Information Security solutions to the Omani and the GCC marketplaces. Since then, InfoShield has evolved into a robust firm, offering a full line of infor-mation security solutions and professional services. InfoShield is a truly information security focused service provider with a deep understanding of the local market needs and requirements. InfoShield has performed work with some of the most highly recognized organizations in Oman. While InfoShield is focused on the regional GCC market, it is at theforefront of current developments in information security.
About InfoShield
COURSE DIRECTOR PROFILE
Outline Course
Process Threats and VulnerabilitiesHacking ToolsTypes of Attack
Probing and ScanningSniffing Foot PrintingSearch Engine Social Engineering Phishing
Viruses Trojans and BackdoorsMalWare Analysis Writing VirusVoIP Hacking Wireless Hacking Bluetooth Hacking
Remove Your Digital Foot Prints Modifying the Logs Installing Backdoors Basic Forensic
Securing Network and Security DevicesSecuring Operating System Securing WebServers Securing Applications Securing Wireless Network
Introduction to Hacking Technique
DAY ONE DAY TWO System Hacking and Enumeration
Hacking RoutersBypassing Firewalls, IPS and IDS Window Operating System HackingAccess Control Hacking Buffer Overflows Viruses and Worms Email Hacking Accounts Webservers HackingSQL Injection Hacks Linux Hacking MAC OS X Hacking
Exploits and Advance Topics
DAY THREE DAY FOUR Covering Tracks and Anti Forensic
DAY FIVEDefending Systems
Discovery Methods
Cancellation Policy4 easy ways to register
1. Tel: +968 – 245111332. Fax completed form to: + 968 – 245111553. Email:training@infoshield.com.om4. Post completed form to: Information Shield P.O Box189 P.C 101, Muscat Oman
Contact Badriya on: Should a delegate be unable to attend, a substitute may attend in his or her place. Cancellations received within 14 working days of the event are liable for the full semi-nar fee. If full payment has been received you are eligible for a 75% reduction on the next run of the seminar. This discount will be valid for one year only. Information Shield LLC reserves the right to change or cancel pro-grammers due to unforeseen circumstances.
On receiving a fax from your organization with a letterhead stating the number and names of the delegates.
Fees : Delegate US$OMR
1 970 2,519
Payments
When organization register four delegates there will be a 10% discount on regular fees Discounts can not beused in conjunction with each other A confirmation letter and invoice will be sent upon receipt of your registration. Please note that full payment must be received prior to the event.
Only those delegates whose fees have been paid in full will be admitted to the event.You can pay by company cheques or bank transfer.
All payments should be in favor of Information Shield LLC
Company:..........................................................................................................................................................................................................Address:............................................................................................................................................................................................................Postcode.........................................Country:..........................................Tel:.......................................Fax:................................................Please note that in completing this booking you undertake to adhere to the cancellation and payment terms listed above.
Signature Date: Approving Manager Position
Registration will only be confirmed
EmailJob titleFirst name SurnameTitleDelegate
2 Delegate
1 Delegate
3 Delegate
Recommended